{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/lMUW20xQTyF5qaNmAMxY/yXYqtGYJeBIt0519iZaQ/KoVAe68wF-2.js"],
  "sourcesContent": ["import{jsx as e,jsxs as t}from\"react/jsx-runtime\";import{Link as n}from\"framer\";import{motion as i}from\"framer-motion\";import*as a from\"react\";export const richText=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/t(\"p\",{children:[\"On \",/*#__PURE__*/e(\"strong\",{children:\"Saturday, February 8\"}),\", the \",/*#__PURE__*/e(\"strong\",{children:\"Hands-on AI Agent Development Workshop\"}),\" brought together over \",/*#__PURE__*/e(\"strong\",{children:\"20 students\"}),\" in a \",/*#__PURE__*/e(\"strong\",{children:\"pilot initiative\"}),\" to gain hands-on experience with \",/*#__PURE__*/e(\"strong\",{children:\"autonomous multi-agent systems using CrewAI\"}),\".\"]}),/*#__PURE__*/t(\"p\",{children:[\"As \",/*#__PURE__*/e(\"strong\",{children:\"AI and automation\"}),\" continue to \",/*#__PURE__*/e(\"strong\",{children:\"reshape industries globally\"}),\", \",/*#__PURE__*/e(\"strong\",{children:\"Pakistan\"}),\" must build \",/*#__PURE__*/e(\"strong\",{children:\"local AI expertise\"}),\" to \",/*#__PURE__*/e(\"strong\",{children:\"keep pace with global advancements\"}),\". This initial workshop served as a \",/*#__PURE__*/e(\"strong\",{children:\"testbed for AI upskilling\"}),\", equipping students with \",/*#__PURE__*/e(\"strong\",{children:\"practical, hands-on AI development experience\"}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\" Bridging the Gap: A Workshop Designed for AI Students\"})}),/*#__PURE__*/t(\"p\",{children:[\"Recognizing the \",/*#__PURE__*/e(\"strong\",{children:\"gap between AI theory and real-world application\"}),\", this pilot workshop prioritized \",/*#__PURE__*/e(\"strong\",{children:\"interactive learning\"}),\" over passive lectures.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"What Made This Workshop Unique?\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Hands-on \",/*#__PURE__*/e(\"strong\",{children:\"Google Colab coding sessions\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Practical \",/*#__PURE__*/e(\"strong\",{children:\"multi-agent AI development\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Experimenting with \",/*#__PURE__*/e(\"strong\",{children:\"AI workflow automation\"})]})})]}),/*#__PURE__*/t(\"p\",{children:[\"Instead of traditional teaching methods, participants actively \",/*#__PURE__*/e(\"strong\",{children:\"coded AI workflows\"}),\" and explored \",/*#__PURE__*/e(\"strong\",{children:\"multi-agent collaboration\"}),\". This hands-on approach \",/*#__PURE__*/e(\"strong\",{children:\"bridged the gap between AI theory and real-world implementation\"}),\".\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\" Key Takeaways from the Workshop\"})}),/*#__PURE__*/t(\"p\",{children:[\"Since this was an \",/*#__PURE__*/e(\"strong\",{children:\"introductory session\"}),\", we focused on \",/*#__PURE__*/e(\"strong\",{children:\"fundamental concepts and hands-on practice\"}),\" with CrewAI. Participants learned:\"]}),/*#__PURE__*/t(\"p\",{children:[\"The \",/*#__PURE__*/e(\"strong\",{children:\"difference between AI agents & AI assistants\"}),\" \uD83E\uDD16\",/*#__PURE__*/e(\"br\",{}),\"How to \",/*#__PURE__*/e(\"strong\",{children:\"develop multi-agent systems\"}),\" for research, summarization, and quiz generation\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"strong\",{children:\"Practical AI tools\"}),\": Groq (for LLMs), Serper (for automated search)\"]}),/*#__PURE__*/t(\"p\",{children:[\"Using a \",/*#__PURE__*/e(\"strong\",{children:\"Jupyter Notebook template\"}),\", students built an AI-powered system with:\",/*#__PURE__*/e(\"br\",{}),\"\uD83D\uDD39 \",/*#__PURE__*/e(\"strong\",{children:\"A research agent\"}),\" (automating web search)\",/*#__PURE__*/e(\"br\",{}),\"\uD83D\uDD39 \",/*#__PURE__*/e(\"strong\",{children:\"A summarizer\"}),\" (condensing key insights)\",/*#__PURE__*/e(\"br\",{}),\"\uD83D\uDD39 \",/*#__PURE__*/e(\"strong\",{children:\"A quiz generator\"}),\" (testing knowledge automatically)\"]}),/*#__PURE__*/t(\"p\",{children:[\"This \",/*#__PURE__*/e(\"strong\",{children:\"hands-on approach\"}),\" helped students understand \",/*#__PURE__*/e(\"strong\",{children:\"agent collaboration and automation\"}),\", using \",/*#__PURE__*/e(\"strong\",{children:\"freely available AI tools\"}),\".\"]})]});export const richText1=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"\uD83C\uDDF5\uD83C\uDDF0 The Urgent Need for AI Talent in Pakistan\"})}),/*#__PURE__*/t(\"p\",{children:[\"With AI transforming industries globally, \",/*#__PURE__*/e(\"strong\",{children:\"Pakistan has immense potential\"}),\" to become an \",/*#__PURE__*/e(\"strong\",{children:\"AI innovation hub\"}),\". However, \",/*#__PURE__*/e(\"strong\",{children:\"technical expertise and hands-on learning opportunities\"}),\" remain limited.\"]}),/*#__PURE__*/t(\"p\",{children:[\"By organizing this \",/*#__PURE__*/e(\"strong\",{children:\"AI Agent Development Workshop\"}),\", we are taking the \",/*#__PURE__*/e(\"strong\",{children:\"first step\"}),\" toward:\",/*#__PURE__*/e(\"br\",{}),\" \",/*#__PURE__*/e(\"strong\",{children:\"Fostering AI expertise locally\"}),/*#__PURE__*/e(\"br\",{}),\" \",/*#__PURE__*/e(\"strong\",{children:\"Helping students transition from theory to AI automation\"}),/*#__PURE__*/e(\"br\",{}),\" \",/*#__PURE__*/e(\"strong\",{children:\"Preparing Pakistan for the global AI revolution\"})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\" Student Feedback: Hands-on Learning is the Future\"})}),/*#__PURE__*/t(\"p\",{children:[\" \",/*#__PURE__*/e(\"strong\",{children:\"\\\"I'm excited to follow these instructions and enhance my skills in coding AI agents! Although I study Machine Learning and Deep Learning, I haven't had enough time to explore the practical aspects of AI agents and workflows. Looking forward to more hands-on exercises and similar workshops.\\\"\"}),/*#__PURE__*/e(\"br\",{}),\"\uD83D\uDDE3\uFE0F \u2014 \",/*#__PURE__*/e(\"em\",{children:\"Mr. Awais Qureshi, PhD-IT Scholar\"})]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\" What's Next? AI Agents Marketplace & Future Events\"})}),/*#__PURE__*/e(\"p\",{children:\"Building on the insights and feedback from this pilot workshop, we are planning several initiatives to advance AI automation skills in Pakistan:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"A community-driven initiative for students and AI enthusiasts to develop AI-powered projects.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/e(\"p\",{children:\"A potential AI Hackathon to push the boundaries of AI automation.\"})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"11px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:[/*#__PURE__*/t(\"p\",{children:[\"The launch of an \",/*#__PURE__*/e(\"strong\",{children:\"AI Agents Marketplace\"}),\", where developers can create, share, and monetize their AI-driven solutions.\"]}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\" Follow us on \"}),/*#__PURE__*/e(n,{href:\"https://www.linkedin.com/company/alphabase-official\",motionChild:!0,nodeId:\"KoVAe68wF\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:/*#__PURE__*/e(\"strong\",{children:\"Linkedin\"})})}),/*#__PURE__*/e(\"strong\",{children:\" for future AI automation events and the upcoming AI Agents Marketplace.\"})]})]});export const richText2=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"We've been trying out different AI agents lately, and one thing that really caught our attention is the difference between AI agents and AI chatbots. What we've noticed is that many platforms are giving chatbots instead of AI agents while claiming that we provide agents, but there's a significant gap in what they can do. Chatbots are straightforward; they give answers based on predefined rules. But AI agents? They're smarter. They don't just spit out information, they can actually do stuff, they make decisions on their own and then give you the answer that fits best.\"}),/*#__PURE__*/e(\"p\",{children:\"AI technology is changing the game, boosting productivity and speeding up interactions. In fact, the market for AI in customer service alone is expected to hit $14 billion by 2025 (Accenture). At the forefront are two main players: AI agents and chatbots. Both are awesome for increased productivity and\\xa0 customer service, but each brings something different to the table. AI agents use advanced AI to have natural, learning chats with you, while chatbots stick to scripts to handle common questions.\"}),/*#__PURE__*/e(\"p\",{children:\"Let's break down what sets AI agents apart from chatbots, and where they overlap, so businesses can pick the right tool for their needs.\"}),/*#__PURE__*/e(\"h3\",{children:\"AI Agents VS Chatbots\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"AI Agents: What They're About\"}),\" AI Agents are like your digital sidekick. They use advanced AI techniques, large language models (LLMs), and natural language processing (NLP) to understand not just what you're saying, but what you mean. This lets them have real conversations that get smarter over time as they learn from each interaction. AI agents can analyze data and make informed decisions, providing proactive solutions rather than just reactive responses.\"]}),/*#__PURE__*/e(\"p\",{children:\"Here's what makes AI agents cool:\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"They Get You:\"}),\" AI agents remember past interactions, so they can give more personalized responses.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Always Learning:\"}),\" They improve their responses based on what they've learned from talking to you.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"They Get Stuff Done:\"}),\" AI agents can handle tasks and make decisions, making them way more useful than a basic chatbot.\"]})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Chatbots: Quick and Handy\"}),\" Chatbots are like helpful bots for various tasks. They follow scripts to answer common questions and do simple tasks fast and efficiently. They might not be as sophisticated as AI agents, but they get the job done when you need quick answers.\"]}),/*#__PURE__*/e(\"p\",{children:\"Here's what chatbots are good at:\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Stick to the Script:\"}),\" Chatbots use preset rules to provide answers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Speedy Gonzales:\"}),\" They're great at handling tasks like answering FAQs and processing requests quickly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Easy Peasy:\"}),\" Chatbots are easy to set up and maintain.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"What Sets Them Apart\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Conversational Skills\"}),\" AI agents can chat with you like a real person, diving into different topics and understanding nuances. Chatbots? They're more like robots\u2014they stick to their scripts and might get flustered with off-script questions.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Personal Touch and Learning\"}),\" AI agents learn from each chat to make future talks more personal. Chatbots give consistent but general responses since they don't learn from what you tell them.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Flexibility and Growth\"}),\" AI agents are built to scale with your business, getting smarter as they go. Chatbots are simpler to start with, but they might need updates as things get more complex.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Efficiency and Maintenance\"}),\" AI agents need a bit more tech know-how to set up and keep up, but they can seriously lighten your workload over time. Chatbots are easier to launch but might need more regular updates to stay sharp.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Where They're Similar\"}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Boosting Customer Service\"}),\" AI agents and chatbots both rock at improving customer service by being available 24/7 and giving speedy answers. This keeps things ticking along nicely for customers and businesses alike.\"]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Automating the Mundane\"}),\" Both are pros at taking over those repetitive jobs. They handle the regular questions, leaving your human team free to tackle the trickier stuff, which makes everyone happier.\"]}),/*#__PURE__*/e(\"h3\",{children:\"Real-Life Applications\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"AI Agents: Getting Personal\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Healthcare:\"}),\" They help patients book appointments and follow up on care, giving personalized reminders and advice.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Banking:\"}),\" Banks use them to offer financial advice, looking at how you bank to suggest products and savings tips.\"]})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Chatbots: Quick Service\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Retail:\"}),\" They handle things like order tracking and answering product questions, making shopping smoother.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Telecom:\"}),\" They're on the ball with FAQs and troubleshooting, sorting things out in a jiffy.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"Bringing It Together\"}),/*#__PURE__*/e(\"p\",{children:\"AI agents and chatbots each have different roles but they can work together like a dream team. You might start with a chatbot for the basics and then let an AI agent take over for the more personal or complicated stuff. It's all about finding the right fit for your business needs.\"}),/*#__PURE__*/e(\"h3\",{children:\"Choosing Your Tech\"}),/*#__PURE__*/e(\"p\",{children:\"Deciding between AI agents and chatbots depends on:\"}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Service Complexity:\"}),\" AI agents shine with nuanced questions; chatbots are great for straightforward stuff.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Personalization Needs:\"}),\" Want a more tailored experience? AI agents are your go-to. For standard answers, chatbots have your back.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Operation Skills:\"}),\" Consider your team's tech chops. AI agents need a bit more skill to get going, but they can level up your service big time. Chatbots are easier to set up but might need more updates and maintenance as you grow.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Dive into the possibilities and transform your SaaS functionalities. Start shaping the future of SaaS with advanced AI technologies today!\"})]});export const richText3=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In the bustling world of SaaS, providing top-notch customer service is crucial. It's what keeps customers happy and loyal. Enter AI agents, also known as chatbots or virtual assistants. These digital helpers are changing the game for SaaS companies, making customer service faster and more efficient. Let's dive into five ways AI agents are making a big impact.\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Instant Response Times\"}),/*#__PURE__*/e(\"p\",{children:\"One of the biggest advantages of AI agents is their ability to provide instant responses to customer inquiries. Unlike human agents who may be busy with other tasks or unavailable outside of business hours, AI agents are available 24/7. This immediate availability ensures that customers receive timely assistance, reducing frustration and improving their overall experience.\"}),/*#__PURE__*/e(\"h3\",{children:\"2. Handling Repetitive Queries\"}),/*#__PURE__*/e(\"p\",{children:'AI agents are great at handling the repetitive, everyday questions that customers have. Think of those common queries like \"How do I reset my password?\" By automating these responses, human support agents are freed up to tackle more complex issues. This makes the whole support process more efficient and allows human agents to focus on where they can make the most impact.'}),/*#__PURE__*/e(\"h3\",{children:\"3. Personalized Interactions\"}),/*#__PURE__*/e(\"p\",{children:\"AI agents can also make customer interactions feel more personal. AI agents can analyze customer data to provide personalized interactions. They look at customer's history, preferences, and previous interactions, AI agents can tailor their responses to meet individual needs. This level of personalization enhances the customer experience, making users feel valued and understood.\"}),/*#__PURE__*/e(\"p\",{children:\"For example, if a customer frequently uses a particular feature of the SaaS product, the AI agent can provide tips and tricks related to that feature, improving the customer's satisfaction and engagement.\"}),/*#__PURE__*/e(\"h3\",{children:\"4. Proactive Support\"}),/*#__PURE__*/e(\"p\",{children:\"One of the coolest things about AI agents is their ability to offer proactive support. They can monitor user behavior and step in to help before issues become problems. AI agents can initiate conversations with customers who may be experiencing difficulties. This proactive approach helps prevent frustration and ensures that customers receive assistance when they need it most.\"}),/*#__PURE__*/e(\"p\",{children:\"For instance, if an AI agent detects that a customer is struggling to complete a certain task, it can offer guidance or suggest resources to help the customer succeed.\"}),/*#__PURE__*/e(\"h3\",{children:\"5. Gathering and Analyzing Feedback\"}),/*#__PURE__*/e(\"p\",{children:\"AI agents can collect valuable feedback from customers during interactions. By analyzing this feedback, SaaS companies can gain insights into customer satisfaction, identify areas for improvement, and make data-driven decisions to enhance their products and services.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, AI agents can identify trends and patterns in customer feedback, helping SaaS companies to anticipate future needs and stay ahead of the competition.\"}),/*#__PURE__*/e(\"p\",{children:\"As AI technology keeps advancing, the possibilities for AI agents in customer service are only going to grow. Adopting AI agents isn\u2019t just a trend, it\u2019s a smart strategy for delivering outstanding customer experiences in today\u2019s digital age.\"})]});export const richText4=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"In the ever-evolving landscape of artificial intelligence, AI agents are dynamic forces, each with unique capabilities and applications. Whether navigating complex environments or learning from experiences, AI agents drive many groundbreaking innovations. Let\u2019s explore the different types of AI agents, understanding their core principles, strengths, and where they shine the most.\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Simple Reflex Agents: The Instant Reactors\"}),/*#__PURE__*/e(\"p\",{children:\"Imagine making decisions instantly based on a set of predefined rules. Simple reflex agents operate exactly in this realm, much like reflexes in the human body. They continuously perceive their environment through sensors and react immediately.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Strengths:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Fast and efficient decision-making.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ideal for well-defined and predictable environments.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Limitations:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Lack adaptability and learning capabilities.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Depend on a fully observable environment.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Examples:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Email Autoresponders\"}),\": Automatically reply to emails based on predefined templates.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Spam Filters\"}),\": Identify and move spam emails to the junk folder based on set rules.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"2. Model-based Reflex Agents: The Contextual Thinkers\"}),/*#__PURE__*/e(\"p\",{children:\"Model-based reflex agents take things a step further by building and using an internal model of their environment. This allows them to operate effectively even when not everything is directly observable. Imagine a chatbot that remembers the context of your conversation, providing more relevant and meaningful responses.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Strengths:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Handle partially observable environments.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Offer greater flexibility and contextual understanding.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Limitations:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Increased complexity and reliance on the accuracy of internal models.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Limited learning capabilities.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Examples:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Customer Support Chatbots\"}),\": Maintain context throughout a conversation to provide accurate and helpful responses.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Subscription Management Tools\"}),\": Track user interactions and predict needs based on past behavior.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"3. Goal-based Agents: The Purpose-Driven Planners\"}),/*#__PURE__*/e(\"p\",{children:\"In a world driven by objectives, goal-based agents excel. They don\u2019t just react; they plan their actions to achieve specific goals. These agents use planning algorithms to navigate a tree of possibilities, considering the consequences of each action.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Strengths:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Adaptable to changing situations.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Excellent for tasks requiring strategic thinking.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Limitations:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Computationally intensive planning algorithms.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Dependence on well-defined goals and comprehensive environmental information.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Examples:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Sales Automation Tools\"}),\": Plan and optimize sales strategies to achieve revenue targets.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Project Management Software\"}),\": Help teams plan and execute tasks to meet project deadlines.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"4. Utility-based Agents: The Strategic Decision Makers\"}),/*#__PURE__*/e(\"p\",{children:\"Utility-based agents bring a layer of sophistication by evaluating different actions based on a utility function, which assigns desirability scores to outcomes. They aim to maximize their overall utility by choosing actions that yield the highest scores.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Strengths:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Highly adaptive and can incorporate complex preferences and priorities.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Consider multiple factors like risk, time, and effort.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Limitations:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Designing effective utility functions can be challenging.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Computationally expensive to evaluate all possible outcomes.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Examples:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Recommendation Engines\"}),\": Suggest products or services based on predicted user satisfaction.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Dynamic Pricing Algorithms\"}),\": Adjust prices in real-time based on demand and user behavior.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"5. Learning Agents: The Adaptive Innovators\"}),/*#__PURE__*/e(\"p\",{children:\"At the pinnacle of AI agent capabilities, learning agents continuously evolve by learning from their interactions with the environment. They consist of several components, including learning elements, critics, and performance elements, all working in harmony to enhance the agent\u2019s performance over time.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Strengths:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Adapt to new situations and improve performance.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Handle complex, real-world tasks.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Limitations:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Require substantial data and time for effective learning.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Balancing exploration and exploitation can be challenging.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Examples:\"})}),/*#__PURE__*/t(\"ul\",{style:{\"--framer-text-color\":\"rgb(0, 0, 0)\"},children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Personalized Marketing Tools\"}),\": Learn user preferences and behaviors to tailor marketing campaigns.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Predictive Analytics Platforms\"}),\": Continuously improve forecasts and insights based on new data.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"AI agents, with their diverse capabilities, are transforming industries and enhancing our everyday lives. From the simplicity of reflex actions to the sophistication of learning and strategic decision-making, these agents are a testament to the incredible potential of AI agents.\"}),/*#__PURE__*/e(\"p\",{children:\"For SaaS businesses, leveraging AI agents can lead to enhanced customer experiences, optimized operations, and innovative solutions. By integrating the right type of AI agent, you can achieve strategic goals, improve decision-making processes, and offer personalized services to your users. Understanding these agents' strengths and applications will empower your SaaS business to stay ahead of the competition and drive sustainable growth.\"})]});export const richText5=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"AI agents are becoming integral to SaaS businesses, driving efficiency and innovation. Here are some high-impact use cases of AI agents specifically tailored for SaaS companies:\"}),/*#__PURE__*/e(\"h3\",{children:\"1. Customer Support and Service Automation\"}),/*#__PURE__*/e(\"p\",{children:\"SaaS companies often deal with a high volume of customer inquiries and support requests. AI agents can manage these interactions, providing instant responses and resolutions. They handle common issues, guide users through troubleshooting steps, and escalate complex problems to human agents. This ensures 24/7 support, reduces response times, and enhances customer satisfaction.\"}),/*#__PURE__*/e(\"h3\",{children:\"2. Personalized User Onboarding\"}),/*#__PURE__*/e(\"p\",{children:\"Onboarding is crucial for SaaS businesses, as it sets the tone for user experience. AI agents can personalize the onboarding process by guiding new users through product features and functionalities based on their specific needs and usage patterns. They can provide real-time assistance, answer questions, and offer tips to help users get the most out of the software.\"}),/*#__PURE__*/e(\"h3\",{children:\"3. Proactive Customer Retention\"}),/*#__PURE__*/e(\"p\",{children:\"Retaining customers is as important as acquiring new ones. AI agents can analyze user behavior and identify signs of potential churn. By proactively engaging with at-risk customers, offering tailored solutions, and providing timely interventions, AI agents can significantly improve retention rates. For instance, they can suggest features or integrations that might benefit the user, based on their usage patterns.\"}),/*#__PURE__*/e(\"h3\",{children:\"4. Sales and Lead Qualification\"}),/*#__PURE__*/e(\"p\",{children:\"AI agents can streamline the sales process by qualifying leads and nurturing prospects. They can engage with potential customers through chat, email, or even voice, asking relevant questions to understand their needs and determine their fit for the product. This ensures that sales teams spend their time on high-quality leads, improving conversion rates and efficiency.\"}),/*#__PURE__*/e(\"h3\",{children:\"5. Data-Driven Product Development\"}),/*#__PURE__*/e(\"p\",{children:\"AI agents can collect and analyze feedback from users, helping SaaS companies understand their pain points and preferences. This data-driven approach enables more informed decisions in product development, ensuring that new features and improvements align with user needs. AI agents can also A/B test new features and gather real-time feedback, accelerating the development cycle.\"}),/*#__PURE__*/e(\"h3\",{children:\"6. Automated Billing and Subscription Management\"}),/*#__PURE__*/e(\"p\",{children:\"Managing billing and subscriptions can be complex and time-consuming. AI agents can automate these processes, handling everything from invoice generation to payment reminders and subscription renewals. They can also address billing inquiries and resolve issues, ensuring a seamless experience for customers.\"}),/*#__PURE__*/e(\"h3\",{children:\"7. Enhanced Security and Fraud Detection\"}),/*#__PURE__*/e(\"p\",{children:\"For SaaS businesses, security is paramount. AI agents can monitor user activity for suspicious behavior and detect potential security threats in real-time. They can enforce security policies, alert administrators of potential breaches, and even take preventive actions to protect sensitive data. This proactive approach helps in maintaining a secure environment for users.\"}),/*#__PURE__*/e(\"h3\",{children:\"8. In-App Assistance and Training\"}),/*#__PURE__*/e(\"p\",{children:\"AI agents can provide in-app assistance, helping users navigate complex features and offering on-the-spot training. They can answer questions, provide step-by-step instructions, and even demonstrate how to use certain functionalities. This ensures that users can make full use of the software, leading to higher satisfaction and better outcomes.\"}),/*#__PURE__*/e(\"p\",{children:\"AI agents are revolutionizing SaaS businesses by enhancing customer support, personalizing user experiences, and driving efficiency across various operations. By leveraging these intelligent agents, SaaS companies can stay ahead of the competition, deliver superior service, and achieve greater success.\"})]});export const richText6=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Artificial Intelligence (AI) can seem like a complex topic, but it doesn\u2019t have to be. It\u2019s really about using technology to do things better and faster, from serving your customers to managing your stock. Here\u2019s an easy-to-follow guide on how you can make AI work for your business.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Identify Where You Need Help:\"})}),/*#__PURE__*/e(\"p\",{children:\"Think about the parts of your business that could be more efficient. Do you spend a lot of time sorting through customer feedback? Are there bottlenecks in how your products are delivered? Start by pinpointing areas where you feel improvements could be made. This step will help you figure out where AI can have the biggest impact.\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some common use cases of AI across various industries that might align with areas where you need help:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Customer Feedback Analysis:\"}),\" AI can help analyze customer feedback from various sources such as emails, surveys, and social media to provide insights into customer sentiments and preferences.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Supply Chain Optimization:\"}),\" AI can optimize supply chain processes by predicting demand, managing inventory levels, and identifying areas for cost savings.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Personalized Product Recommendations:\"}),\" AI can analyze customer data to provide personalized product recommendations, leading to higher conversion rates and customer satisfaction.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Predictive Maintenance: \"}),\"AI can predict when equipment or machinery is likely to fail, allowing for proactive maintenance to minimize downtime and reduce costs.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Autonomous Vehicles:\"}),\" AI can be used in transportation for autonomous vehicles, optimizing routes, and improving safety.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Fraud Detection: \"}),\"AI can detect fraudulent activities in real-time by analyzing patterns and anomalies in transactions.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/t(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:[/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Virtual Assistants: \"}),\"AI-powered virtual assistants can handle customer inquiries, provide support, and streamline customer service processes.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})})]}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Quality Control:\"}),\" AI can be used in manufacturing for quality control by analyzing images and detecting defects in products.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Energy Management:\"}),\" AI can optimize energy usage in buildings by analyzing data and adjusting settings for heating, cooling, and lighting.\",/*#__PURE__*/e(\"br\",{}),/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",style:{\"--framer-font-size\":\"12px\",\"--framer-text-color\":\"rgb(0, 0, 0)\",\"--framer-text-decoration\":\"none\"},children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Health Monitoring:\"}),\" AI can monitor patient health data to provide early warnings for potential health issues and enable personalized treatment plans.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"Identifying the areas where AI can have the biggest impact in your business can help you prioritize and plan your AI implementation strategy effectively.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Get Your Data Ready:\"})}),/*#__PURE__*/e(\"p\",{children:\"AI works best when it has a lot of information to learn from. This could be details about how customers interact with your website, what people are buying, or how often you need to restock. Make sure you're collecting this data in a way that's easy to access and analyze. If you\u2019re not sure how to do this, it might be worth taking AI consultation\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Train Your Team:\"})}),/*#__PURE__*/e(\"p\",{children:\"Your employees need to be comfortable using these new tools. Invest in training so they understand how AI fits into their daily work. If the technology seems daunting, remind them that it's there to make everyone's job easier, not more complicated.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Start Small:\"})}),/*#__PURE__*/e(\"p\",{children:\"You don\u2019t have to overhaul your entire business at once. Choose a small project to start with, like automating customer emails or tracking inventory more efficiently. This lets you see what works and what doesn\u2019t without too much risk.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Keep an Eye on Things:\"})}),/*#__PURE__*/e(\"p\",{children:\"Once your AI tools are up and running, check in regularly to see how they\u2019re doing. Are they saving time? Helping you make better decisions? If something isn\u2019t working as expected, it might need tweaking.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Stay Ethical:\"})}),/*#__PURE__*/e(\"p\",{children:\"Make sure your AI tools respect your customers' privacy and your company\u2019s values. Using AI responsibly builds trust with your customers.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Never Stop Learning:\"})}),/*#__PURE__*/e(\"p\",{children:\"AI technology is always improving, and keeping up with new developments can give your business an edge. Consider attending workshops, reading up on the latest trends, or even just talking to others in your industry about how they use AI.\"}),/*#__PURE__*/e(\"p\",{children:\"By following these steps, you can integrate AI into your business operations strategically, improving efficiency and enhancing customer experiences.\"})]});export const richText7=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"By following these steps, you can integrate AI into your business operations strategically, improving efficiency and enhancing customer experiences.\"})});export const richText8=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h1\",{children:\"1. Introduction\"}),/*#__PURE__*/e(\"h2\",{children:\"Brief overview of Blockchain technology\"}),/*#__PURE__*/e(\"p\",{children:\"Some of the most promising use cases of Blockchain include supply chain management, voting systems, identity management, and decentralized finance. However, the technology is still in its early stages of development and faces challenges such as scalability and interoperability.\"}),/*#__PURE__*/e(\"p\",{children:\"Overall, Blockchain technology has the potential to revolutionize many industries and has already shown promise in transforming the way we conduct transactions and manage data. However, as the number of Blockchain networks and applications grow, there is a need for inter-Blockchain communication and cross chain bridges to enable communication and interoperability between different Blockchain networks.\"}),/*#__PURE__*/e(\"h2\",{children:\"Explanation of IBC and Cross-Chain Bridges\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:/*#__PURE__*/e(\"strong\",{children:\"Importance of interoperability between different Blockchain networks\"})}),/*#__PURE__*/e(\"p\",{children:\"Interoperability between different Blockchain networks is crucial for the growth and adoption of Blockchain technology. Blockchain interoperability allows for different Blockchain networks to communicate with each other and exchange assets and data, which opens up new possibilities for decentralized applications.\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some key points on the importance of interoperability between different Blockchain networks:\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h1\",{children:\"2. Inter-Blockchain communication (IBC)\"}),/*#__PURE__*/e(\"h2\",{children:\"Definition of IBC and its role in the Cosmos ecosystem\"}),/*#__PURE__*/e(\"p\",{children:\"Inter-Blockchain Communication (IBC) is a protocol for communication and data transfer between independent Blockchains, developed by the Cosmos Network. IBC is a key feature of the Cosmos ecosystem, which aims to create an interconnected network of independent Blockchains.\"}),/*#__PURE__*/e(\"p\",{children:\"The role of IBC in the Cosmos ecosystem is to enable communication and interoperability between different Blockchains. This allows independent Blockchains to communicate with each other, exchange assets and data, and share functionalities without relying on centralized intermediaries.\"}),/*#__PURE__*/e(\"p\",{children:\"The IBC protocol provides the necessary infrastructure to establish secure connections and authenticate data packets between different Blockchains. It consists of two distinct layers: the transport layer and the application layer. The transport layer provides the necessary infrastructure for establishing secure connections and authenticating data packets between chains, while the application layer defines how data packets should be packaged and interpreted by the sending and receiving chains.\"}),/*#__PURE__*/e(\"p\",{children:\"The IBC protocol is critical to the vision of the Cosmos ecosystem, which is to create an interconnected network of independent Blockchains that can communicate with each other and share functionalities. This will allow developers to build applications that leverage the strengths of different Blockchains and create new use cases that were previously not possible.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key components of IBC:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Tender mint Core: Tender mint is a consensus engine that provides the underlying technology for many Blockchain networks. It allows different Blockchain networks to share a common communication protocol, making it easier to establish communication and data transfer between them.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cosmos SDK: Cosmos SDK is a set of tools and libraries that enable developers to build custom Blockchain networks and dApps. It includes a module for IBC, which allows developers to integrate IBC functionality into their applications.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"IBC Protocols: There are several IBC protocols that have been developed to enable inter-Blockchain communication, including the Inter-Blockchain Communication Protocol (IBC), the Peg Zone Protocol, and the Light Client Protocol. These protocols provide the technical specifications for how different Blockchain networks can communicate with each other.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Relayers: Relayers are the nodes that facilitate communication between different Blockchain networks. They act as intermediaries, relaying messages and data between Blockchain networks to enable cross-chain communication.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Channels: Channels are the communication pathways that are used to transfer information between different Blockchain networks. They are established through the IBC protocols and are used to transfer tokens, assets, and data between the networks.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Packets: Packets are the data structures used to send information between different Blockchain networks. They are used to transfer information across channels and are encoded in a way that ensures their security and authenticity.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Client: The client is the software that runs on each Blockchain network and is responsible for ensuring that the network is following the IBC protocols. It is used to verify transactions and ensure that the network is secure and reliable.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Advantages and limitations of using IBC\"}),/*#__PURE__*/e(\"h3\",{children:\"Advantages of using Inter-Blockchain Communication (IBC):\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Interoperability: IBC enables communication and interoperability between different Blockchains, which opens up new possibilities for decentralized applications and allows for the exchange of assets and data across different chains.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Scalability: IBC can help to enhance the scalability of Blockchain networks by allowing them to offload transactions to other Blockchains, thereby reducing congestion and increasing throughput.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Security: IBC enables secure communication and data transfer between different Blockchains, providing a more secure and trustless way to exchange assets and data.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Flexibility: IBC is a modular and flexible protocol that can be customized and extended to meet the specific needs of different applications and use cases.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Decentralization: IBC promotes the decentralization of Blockchain networks by allowing them to communicate with each other without relying on centralized intermediaries.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h3\",{children:/*#__PURE__*/e(\"strong\",{children:\"Limitations of usingInter-Blockchain Communication (IBC):\"})}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Complexity: IBC is a complex protocol that requires a certain level of technical expertise to implement and use effectively.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Security risks: IBC introduces new security risks, such as the possibility of attacks on the transport layer or the misinterpretation of data packets by the receiving chain.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Protocol compatibility: IBC requires that different Blockchains implement compatible versions of the protocol in order to communicate with each other, which can create compatibility issues and hinder adoption.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cost: Implementing and using IBC can be expensive, both in terms of development costs and transaction fees.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"What connects the Blockchain in the cosmos ecosystem\"}),/*#__PURE__*/e(\"p\",{children:\"The Inter-Blockchain Communication (IBC) protocol connects independent Blockchain networks in the Cosmos ecosystem allowing them to communicate and transact securely and in a decentralized manner. The protocol establishes a connection between Blockchains by creating an IBC channel which allows them to send and receive packets of data. The handshake process verifies the authenticity and integrity of the connection after which the two Blockchains can transmit data. The packets can contain tokens, messages or other information and are encoded and signed to ensure their authenticity and integrity. The protocol verifies the packets according to predetermined rules including the digital signature, data validation and source verification. The IBC protocol enables data to be transmitted across multiple Blockchains through intermediate relays making it a critical component of the Cosmos ecosystem.\"}),/*#__PURE__*/e(\"h1\",{children:\"3. Cross-Chain Bridges\"}),/*#__PURE__*/e(\"h2\",{children:\"Definition of Cross-Chain Bridges and their purpose\"}),/*#__PURE__*/e(\"p\",{children:\"Cross-Chain Bridges are protocols that connect different Blockchain networks to enable seamless transfer of tokens and NFTs across different networks. The purpose of Cross-Chain Bridges is to promote interoperability among different Blockchain networks thereby enabling users to utilize the benefits of multiple networks without having to switch between them. The Cross-Chain Bridge protocol incentivizes liquidity providers by allowing them to earn yield on the liquidity they provide, thereby promoting the provision of liquidity on the platform. The protocol also promotes community governance and self-listings, enabling communities and creators to add their own tokens to the bridge, thereby benefiting from greater accessibility and security. The Cross-Chain Bridge protocol has been audited both internally and externally to ensure its security and reliability. Its aim is to provide a seamless bridging experience for both tokens and NFTs, making it possible to move any token to almost any network. This will enable users to connect their preferred wallet of choice and pay, play, trade, etc. in any dApp/network seamlessly, thereby promoting crypto mass-adoption. The Cross-Chain Bridge solves the existing problems with bridges by providing a flexible deposit and claim approach, multi-signature validation, permissionless self-listings, and incentives for liquidity providers and community-sourced bridge liquidity.\"}),/*#__PURE__*/e(\"h2\",{children:\"Key components of Cross Chain Bridges:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Multi-Signature Wallets: Multi-signature wallets are used to hold and manage funds on both sides of the bridge. They require multiple signatures to authorize transactions, making it more difficult for attackers to steal funds.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Smart Contracts: Smart contracts are used to create the bridge between the different Blockchain networks. They automate the process of transferring tokens and assets between the networks, ensuring that transactions are secure and reliable.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Oracles: Oracles are used to verify transactions and provide external data to the smart contracts. They ensure that transactions are valid and secure, and that the smart contracts have access to accurate and reliable information.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Validators: Validators are responsible for verifying transactions and maintaining the security of the network. They are selected based on their reputation and expertise, and they are incentivized to act in the best interests of the network.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Governance Systems: Governance systems are used to manage and coordinate the activities of the network. They allow stakeholders to participate in decision-making processes and ensure that the network is operating in a fair and transparent manner.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Interoperability Protocols: Interoperability protocols are used to ensure that different Blockchain networks can communicate with each other. They define the technical specifications for how tokens and assets can be transferred between the networks, and they ensure that transactions are secure and reliable.\"})})]}),/*#__PURE__*/t(\"h2\",{children:[\"Advantages and limitations of \",/*#__PURE__*/e(\"strong\",{children:\"using Cross-Chain Bridges\"})]}),/*#__PURE__*/e(\"h3\",{children:\"Advantages of using Cross-Chain Bridges:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Increased Liquidity: Cross-Chain Bridges provide increased liquidity for tokens and NFTs by enabling them to move between different Blockchain networks, which ultimately leads to better pricing and higher trading volumes.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"More Opportunities for Trading: By enabling cross-chain trading, Cross-Chain Bridges offer more opportunities for trading and investing in a wider range of tokens and NFTs.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Enhanced Accessibility: Cross-Chain Bridges allow users to access tokens and NFTs across different Blockchain networks, which enhances accessibility and eliminates the need for users to switch between different wallets and networks.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Interoperability: Cross-Chain Bridges enable interoperability between different Blockchain networks, which can lead to new use cases and applications in the crypto ecosystem.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Limitations of using Cross-Chain Bridges:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Complexity: Cross-Chain Bridges can be complex to use and require technical knowledge to set up and manage. Users need to understand the risks involved in using these bridges, such as the possibility of losing funds due to failed transactions or hacking attacks.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"High Transaction Fees: Cross-Chain Bridges can be expensive to use due to high transaction fees associated with moving tokens between different Blockchain networks.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Network Congestion: Cross-Chain Bridges may experience network congestion during times of high transaction volume, which can cause delays and increased transaction fees.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Counterparty Risk: Cross-Chain Bridges require users to trust the smart contracts and the bridge operators. If the bridge operators act maliciously or the smart contracts are flawed, users can lose their funds.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Security Risk: Cross chain bridges can also pose security risks with their own security protocols. Any security vulnerabilities in the bridge can lead to loss or theft of assets.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Centralization Risk: Cross chain bridges mostly rely on a centralized group of validators which goes against the decentralized nature of the Blockchain technology. This centralization can result in reduced security and trust in the system.\"})})]}),/*#__PURE__*/e(\"h1\",{children:\"4. Comparing IBC and Cross-Chain Bridges\"}),/*#__PURE__*/e(\"h2\",{children:\"Differences in ecosystem and network connectivity\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Working mechanism\"}),/*#__PURE__*/e(\"h3\",{children:\"Working mechanism for IBC (Inter-Blockchain communication):\"}),/*#__PURE__*/e(\"p\",{children:\"The Inter-Blockchain Communication (IBC) protocol works by enabling independent Blockchains to communicate with each other in a secure and decentralized manner. The following steps describe how the IBC protocol works:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Establishing a connection: To use the IBC protocol, two independent Blockchains need to establish a connection with each other. This is done by creating an IBC channel between the two Blockchains. The channel establishes a secure connection and enables the two Blockchains to communicate with each other.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Packet transmission: Once the IBC channel is established, the two Blockchains can transmit packets of data to each other. Packets can contain various types of data, including tokens, messages, or other information.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Packet processing: When a packet is received by a Blockchain, it is processed and verified according to a set of predetermined rules. If the packet is valid, it is accepted by the receiving Blockchain, and the appropriate action is taken (e.g., executing a transaction, updating a smart contract state, etc.).\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Acknowledgment: After a packet is received and processed, the receiving Blockchain sends an acknowledgment message back to the sending Blockchain. This message confirms that the packet was successfully received and processed.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Timeouts: The IBC protocol includes a timeout mechanism that ensures that packets are transmitted and processed within a specified time frame. If a packet is not acknowledged within the allotted time, it is considered invalid, and the appropriate action is taken (e.g., resending the packet, canceling the transaction, etc.).\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Overall, the IBC protocol enables independent Blockchains to communicate and transact with each other in a secure and decentralized manner. It allows for greater interoperability between different Blockchain networks and enables the creation of more complex cross-chain applications.\"}),/*#__PURE__*/e(\"h3\",{children:\"Working mechanism for Cross Chain Bridges:\"}),/*#__PURE__*/e(\"p\",{children:\"A cross-chain bridge is a mechanism that allows interoperability between two separate Blockchain networks. It allows the transfer of assets or data between two different Blockchain ecosystems that would otherwise be isolated from each other. Here are the general steps involved in how a cross-chain bridge works:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Locking Assets: The user initiates a transaction by locking their assets on one Blockchain.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Chain linking: The cross-chain bridge smart contract on the first Blockchain sends a message to a corresponding contract on the second Blockchain, containing all necessary information about the transaction, including the address of the recipient and the amount of assets to be transferred.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Verification: The second Blockchain verifies the transaction request and confirms that the assets have been locked on the first Blockchain.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Minting: The second Blockchain mints an equivalent amount of assets and sends them to the specified recipient.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Unlocking: Finally, the recipient of the assets can unlock and transfer them back to the original Blockchain, following a similar process.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Overall, cross-chain bridges provide a way for different block chain networks to communicate with each other, which is essential for the growth and development of the Blockchain ecosystem as a whole. By allowing for the transfer of assets and data between different Blockchain networks, cross-chain bridges increase the usability and versatility of Blockchain technology, enabling a broader range of use cases and applications.\"}),/*#__PURE__*/e(\"h2\",{children:\"Efficiency and scalability\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h2\",{children:\"Ease of use and accessibility\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h1\",{children:\"5. Choosing the Right Tool\"}),/*#__PURE__*/e(\"h2\",{children:\"Considerations for selecting between IBC and Cross-Chain Bridges\"}),/*#__PURE__*/e(\"p\",{children:\"When choosing between IBC (Inter-Blockchain Communication) and cross-chain bridges, there are several important considerations to take into account.\"}),/*#__PURE__*/e(\"p\",{children:\"Firstly, it's important to understand the key differences between these two technologies. IBC is a protocol for communication between Blockchains within the same ecosystem (e.g. within the Cosmos ecosystem), whereas cross-chain bridges are used to connect two different Blockchain ecosystems (e.g. Ethereum and Binance Smart Chain).\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Interoperability requirements: One important consideration when selecting between IBC and cross-chain bridges is the level of interoperability required. If you only need to connect Blockchains within the same ecosystem, IBC may be the better choice as it is specifically designed for this purpose and offers greater functionality and security within that context. On the other hand, if you need to connect two different Blockchain ecosystems, cross-chain bridges are the only option available.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[\"Technical expertise: When considering implementing cross-chain communication solutions such as IBC or cross-chain bridges, it's important to consider the technical requirements and expertise needed.\",/*#__PURE__*/e(\"br\",{}),\"For IBC, both Blockchains involved in the communication need to support the protocol and have compatible consensus mechanisms. This can be challenging to set up and maintain, and may require expertise in programming languages such as Golang, Rust, Solidity, Typescript or Java depending on the specific Blockchain platform.\",/*#__PURE__*/e(\"br\",{}),\"On the other hand, cross-chain bridges only need to connect two Blockchain ecosystems, making the technical requirements more straightforward. However, there may still be technical requirements involved in building and maintaining the bridge, which may require expertise in programming languages such as Rust, Golang, or Typescript depending on the specific bridge implementation.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Security considerations: Security is also a crucial factor to consider when selecting between IBC and cross-chain bridges. IBC is designed with security in mind and offers features such as end-to-end encryption and authenticated data channels to ensure the integrity and privacy of communications. Cross-chain bridges may also have security measures in place, but they may be more vulnerable to attacks and require additional security measures to be implemented.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ease of Use and Accessibility: Consider the technical expertise of the users who will be interacting with the tool. If your users are novice users or do not have knowledge of the underlying Blockchain protocol, then cross-chain bridges may be the better choice, as they are generally easier to use and do not require the user to have any knowledge of the underlying protocol. If accessibility is a concern, then cross-chain bridges may also be a better choice, as they can be used to transfer assets and data between any two Blockchain networks.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Scalability and performance needs: Finally, it's important to consider the scalability and performance of each solution. IBC is designed for high-performance communication between Blockchains within the same ecosystem, which may offer greater scalability and efficiency. Cross-chain bridges, on the other hand, may face greater scalability challenges due to the need to communicate between different ecosystems.\"})})]}),/*#__PURE__*/e(\"h2\",{children:\"Use cases for IBC and Cross-Chain Bridges\"}),/*#__PURE__*/e(\"p\",{children:\"When it comes to use cases for IBC (Inter-Blockchain Communication) and cross-chain bridges, both technologies have their own unique strengths and weaknesses. Here are some potential use cases for each:\"}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for IBC:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Decentralized Finance (DeFi): IBC can be particularly beneficial for DeFi as it enables different DeFi applications to communicate with each other within the same Blockchain ecosystem. This enables greater liquidity by allowing users to easily transfer assets between different DeFi applications, reducing fragmentation and increasing efficiency. Additionally, IBC can facilitate the creation of more complex and innovative DeFi applications by enabling the integration of different DeFi protocols and applications within the same ecosystem. IBC also provides enhanced security features, such as end-to-end encryption and authenticated data channels, which can help to ensure the integrity and privacy of communications between different DeFi applications.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Supply Chain Management: IBC can be advantageous for supply chain management as it allows different Blockchain-based supply chain solutions to communicate with each other, improving transparency and traceability. This can enable greater efficiency and cost savings by reducing the need for intermediaries and improving the accuracy of information. Additionally, IBC can facilitate the exchange of digital assets and payments between different participants in the supply chain, reducing friction and increasing speed.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gaming: IBC can be useful for gaming as it allows different Blockchain-based gaming applications to communicate with each other, enabling cross-game interactions and the creation of more complex gaming experiences. This can improve user engagement and loyalty, as well as increase revenue opportunities for game developers. Additionally, IBC can enable the exchange of in-game assets and currencies between different games, creating new revenue streams for game developers and players.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identity Management: IBC can be advantageous for identity management as it enables different Blockchain-based identity solutions to communicate with each other, improving security and control over personal data. This can enable greater privacy and reduce the risk of identity theft or fraud. Additionally, IBC can enable the exchange of verified credentials and identity information between different organizations, reducing the need for redundant identity verification processes and improving the efficiency of identity management.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Use Cases for Cross-Chain Bridges:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Asset Transfer: Cross-chain bridges can be particularly beneficial for asset transfer as they allow users to transfer assets between different Blockchain networks. This enables greater liquidity and access to a wider range of assets, reducing fragmentation and increasing efficiency. Additionally, cross-chain bridges can facilitate the creation of new financial products and services by enabling the integration of different Blockchain-based assets and currencies.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Interoperability: Cross-chain bridges can be useful for interoperability as they enable different Blockchain networks to communicate with each other, improving connectivity and reducing the need for intermediaries. This can enable greater innovation and collaboration across different Blockchain ecosystems, as well as improve the scalability and functionality of Blockchain-based solutions.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Decentralized Exchanges (DEXs): Cross-chain bridges can be advantageous for DEXs as they enable the trading of assets across different Blockchain networks, increasing liquidity and reducing friction. This can create new revenue opportunities for DEXs and enable a wider range of assets to be traded in a decentralized manner. Additionally, cross-chain bridges can facilitate the creation of new trading pairs and the integration of different Blockchain-based protocols and applications within the same ecosystem.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"NFTs (Non-Fungible Tokens): Cross-chain bridges can be beneficial for NFTs as they enable the transfer of NFTs between different Blockchain networks, increasing liquidity and accessibility. This can enable greater innovation and collaboration in the NFT space, as well as create new revenue opportunities for NFT creators and collectors. Additionally, cross-chain bridges can enable the creation of new NFT marketplaces and platforms that support multiple Blockchain networks.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h2\",{children:\"Which tool is best suited for specific scenarios\"}),/*#__PURE__*/e(\"p\",{children:\"Here are some scenarios where Inter-Blockchain Communication (IBC) and Cross-Chain Bridges may be best suited:\"}),/*#__PURE__*/e(\"h3\",{children:\"Inter-Blockchain Communication (IBC):\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Intra-Ecosystem Communication: If you need to enable communication between different Blockchain networks within the same ecosystem, IBC is the best choice. For example, if you need to enable communication between different Blockchains within the Cosmos ecosystem, which is specifically designed for IBC, IBC would be the best choice.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Large Asset Transfers: If you need to transfer a large amount of assets between different Blockchain networks, IBC may be the best choice. IBC is built directly into the Blockchain protocol and can provide greater security and efficiency for larger asset transfers.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Scalability: If scalability is a concern, IBC may be the best choice. IBC is built directly into the Blockchain protocol, which can help achieve scalability in a more integrated and efficient manner.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"Cross-Chain Bridges:\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Inter-Ecosystem Communication: If you need to enable communication between different Blockchain networks that are not part of the same ecosystem, cross-chain bridges may be the best choice. For example, if you need to enable communication between the Ethereum and Polkadot ecosystems, cross-chain bridges would be the best choice.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Small Asset Transfers: If you need to transfer a small amount of assets between different Blockchain networks, cross-chain bridges may be the best choice. Cross-chain bridges can be simpler and more accessible for users, which can make them more suitable for smaller asset transfers.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Flexibility: Cross-chain bridges can be more flexible in terms of which Blockchain networks they can connect. They do not require the Blockchain networks to be part of the same ecosystem, which can provide more options for cross-chain communication.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"Overall, the choice between IBC and cross-chain bridges will depend on the specific requirements and constraints of your use case. It is important to carefully consider each of these factors when making your decision.\"}),/*#__PURE__*/e(\"h1\",{children:\"6. Conclusion\"}),/*#__PURE__*/e(\"h2\",{children:\"Recap of the comparison between IBC and Cross-Chain Bridges\"}),/*#__PURE__*/e(\"p\",{children:\"To recap, both IBC and cross-chain bridges are valuable tools for achieving interoperability between different Blockchain networks and applications.\"}),/*#__PURE__*/e(\"p\",{children:\"IBC is a protocol that enables secure and efficient communication between different Blockchain networks within the Cosmos ecosystem. It allows for the seamless transfer of assets and data between different networks, making it an ideal solution for projects operating within the Cosmos ecosystem.\"}),/*#__PURE__*/e(\"p\",{children:\"On the other hand, cross-chain bridges are better suited for asset transfer and decentralized exchanges. They enable users to move assets between different Blockchain networks, including those outside the Cosmos ecosystem, while also enabling the creation of decentralized exchanges.\"}),/*#__PURE__*/e(\"p\",{children:\"Ultimately, the choice between IBC and cross-chain bridges depends on the specific requirements of the project. By carefully considering the use case and evaluating the strengths and weaknesses of each tool, project managers and developers can choose the tool that is best suited for their specific needs and optimize their chances of success.\"})]});export const richText9=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h1\",{children:\"1. Introduction\"}),/*#__PURE__*/e(\"p\",{children:\"Decentralized Finance (DeFi) is a rapidly emerging sector of finance and technology. It refers to a new financial system based on Blockchain technology that facilitates the development of open, transparent, and widely available financial apps and services. The DeFi ecosystem has gained enormous popularity in recent years, and the overall value of the protocols has reached billions of dollars. Many experts believe that DeFi has the potential to disrupt traditional finance and bring financial services to a wider range of people. The market experienced an explosive growth in the beginning of 2020. According to the latest stats by Banklesstimes, the DeFi\u2019s TVL was estimated at $60 Billion as of November, 2022. The market cap of DEXs increased by 36.8% as compared to the previous year. It is predicted that the TVL is expected to reach $231.19 billion in 2030.\"}),/*#__PURE__*/e(\"p\",{children:\"After reading this blog, you will have a clear understanding of how you can turn your DeFi idea into a minimum viable product (MVP). The process of creating an MVP involves defining the problem, target users, and value proposition of the DeFi concept, prioritizing essential features, building a basic version of the product and continuously gathering feedback from users to improve and develop the MVP into a full-fledged DeFi solution. By following this very guide and keeping a focus on delivering value to users, you will be well on your way to successfully turning your DeFi concept into a MVP.\"}),/*#__PURE__*/e(\"p\",{children:\"A deep understanding of the DeFi ecosystem is essential for starting a successful DeFi platform. DeFi is a complex and rapidly evolving field, and it is crucial to have a clear understanding of the various protocols, technologies, and market trends. In order to get started, here are some key concepts that you should familiarize yourself with:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Blockchain Technology:\"}),\" Blockchain technology is a decentralized digital ledger that eliminates the need for middlemen and enables safe and transparent transactions. It is made up of a chain of blocks, each of which contains a list of transactions that are confirmed by a network of users and added to the chain. The integrity of the data kept on the chain is ensured by the decentralized structure of Blockchain, which makes it difficult to hack or alter.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Smart Contract:\"}),\" Smart contracts automate the negotiation and execution of contracts through self-executing clauses. These are Blockchain-based computer programs that are programmed to automatically carry out a contract's terms if a set of prerequisites have been satisfied. Smart contracts are a helpful tool for a range of applications, including supply chain management, real estate, and financial services. They are safe, transparent, and irreversible.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Token Economics:\"}),\" Token economics is the study of the economic and business principles that underpin the creation, distribution, and use of tokens. It involves analyzing the value proposition of a token, understanding the incentives for different stakeholders, and designing mechanisms to align those incentives with the desired outcomes. Token economics can help to create sustainable and effective token ecosystems that provide value to users and stakeholders alike.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Market Trends:\"}),\" Closely studying market trends is an essential step in building a successful DeFi startup. By analyzing the growth and adoption of different DeFi protocols, as well as identifying gaps in the market, entrepreneurs can create innovative solutions that meet the needs of users and stakeholders.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Security breaches can result in significant financial losses for users and can undermine confidence in DeFi as a viable alternative to traditional finance. By prioritizing security, DeFi developers can promote the long-term sustainability and adoption of the ecosystem, and ensure that users can engage with DeFi protocols with confidence.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"In the next step, we will see the DeFi Product Development framework and its steps.\"}),/*#__PURE__*/e(\"h1\",{children:\"2. DeFi Product Development Framework\"}),/*#__PURE__*/e(\"h2\",{children:\"2.1 Product Planning Session\"}),/*#__PURE__*/e(\"h3\",{children:\"2.1.1 Product Concept\"}),/*#__PURE__*/e(\"p\",{children:\"To start a successful DeFi platform, it's crucial to evaluate your idea and identify a real market need. \\xa0This involves identifying the problem your platform will solve, such as a lack of access to conventional financial services or high fees. It's \\xa0also \\xa0essential to \\xa0consider \\xa0the \\xa0best \\xa0Blockchain \\xa0networks, \\xa0technologies \\xa0for \\xa0front \\xa0and \\xa0back-end services and whether a mobile app or website is needed for the platform.\"}),/*#__PURE__*/e(\"h3\",{children:\"2.1.2 Establishing KPIs\"}),/*#__PURE__*/e(\"p\",{children:\"Establishing KPIs are important to identify the specific metrics that will be used to measure the success and progress of the business. KPIs help to track performance, evaluate success, and make informed decisions about the business.\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Define business goals: Identify the specific objectives and goals of the DeFi startup. This could be related to user acquisition, revenue, platform adoption, or other relevant metrics.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Identify key metrics: Determine the metrics that are most relevant to measure progress towards the business goals. For a DeFi startup, this could include metrics related to transaction volume, user acquisition, user engagement, platform adoption, or revenue.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Set targets: Establish specific targets or benchmarks for each KPI. This helps to track progress and evaluate success over time.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Monitor progress: Regularly track and monitor progress towards the established KPIs. This helps to identify areas of success and areas that need improvement.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Adjust targets as needed: If progress is not meeting established targets, adjust the targets or KPIs as needed. This ensures that the business is focused on the most important metrics for success.\"})})]}),/*#__PURE__*/e(\"h3\",{children:\"2.1.3 Plan Release Cycle\"}),/*#__PURE__*/e(\"p\",{children:\"To get our DeFi startup product out into the hands of customers as quickly as possible, we will plan a phased release cycle. The release cycle will be divided into the following phases:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Alpha Testing:\"}),\" We will conduct alpha testing of our platform with a select group of users to identify and fix any bugs or issues.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Beta Testing:\"}),\" We will invite a larger group of users to participate in beta testing to further refine our product and gather feedback.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Public Release:\"}),\" We will launch our platform to the public and promote it through targeted marketing campaigns.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Continuous Improvement:\"}),\" We will continuously monitor our KPIs and gather feedback from users to make improvements to our platform and enhance the user experience.\"]})})]}),/*#__PURE__*/e(\"h3\",{children:\"2.1.4 Community Building\"}),/*#__PURE__*/e(\"p\",{children:\"Building a solid user and development community is essential for the success of your DeFi platform. A helpful community can offer insightful criticism and aid in maintaining the platform ensuring its longevity and continued growth. It is important to regularly engage with your community through events, social media and other channels to stay in touch with their needs and preferences. Meeting customer needs and staying ahead in the competition require your DeFi platform to be updated and improved on a regular basis. This can involve adding new features, enhancing existing ones and addressing any flaws or potential problems that may arise.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h2\",{children:\"2.2 Product Meeting\"}),/*#__PURE__*/e(\"p\",{children:\"During the product meeting module of a DeFi startup, it is important to focus on key areas defined below:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Define the theme:\"}),\" Begin by defining the theme for the development cycle based on the KPI. This will help to align the team's efforts towards achieving the desired outcome.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Brainstorming:\"}),\" Encourage everyone to participate in a brainstorming session to generate ideas for features, bugs, and tests. This will help to ensure that all relevant perspectives are considered, and ideas can be prioritized based on KPI.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Feature grading:\"}),\" The technical lead should grade the features based on their level of complexity: easy, medium, or hard. This will help to identify the features that are most critical for achieving the desired KPIs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Prioritize features:\"}),\" Mostly hard features should be prioritized over easy and medium ones to ensure that the team is focused on the most impactful features that will help achieve the KPIs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Specification and task assignment:\"}),\" Once the features have been prioritized, everyone in the meeting should work on specifying the features and assigning tasks. This will help to ensure that everyone is clear on their responsibilities and timelines to deliver the features.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Stick to Plan release cycle:\"}),\" The team should stick to the release cycle based on the prioritized features and KPIs. This will help to ensure that the most impactful features are released first, and the team can measure their success against the KPIs.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h2\",{children:\"2.3 Product Development\"}),/*#__PURE__*/e(\"p\",{children:\"The product development phase is one of the most important module of creating a DeFi startup. Some of the important points to keep in mind includes:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Start working:\"}),\" After the planning phase, the team should start working on their assigned tasks. It's important to have a clear understanding of the tasks and deadlines to ensure that everything is completed on time.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Stick to the plan:\"}),\" It's crucial to stick to the plan and avoid changing the specifications or adding new features. Any changes should be evaluated carefully to ensure that they align with the product goals and KPIs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Release the product:\"}),\" Once the product is ready, it should be released to customers as soon as possible. This will provide valuable insights into the product's usability, functionality, and overall value.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Gather feedback:\"}),\" It's important to gather feedback from customers and other stakeholders to understand their experience with the product. This feedback should be used to identify areas for improvement and make necessary adjustments to the product.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Iterate and improve:\"}),\" Based on the feedback and data gathered, the team should iterate and improve the product to better meet the needs of customers and achieve the desired KPIs. This process should be continuous to ensure that the product remains relevant and competitive.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Collaboration and communication: \"}),\"Effective collaboration and communication are key to a successful product development process. The team should have regular check-ins to ensure that everyone is on the same page and to address any issues that arise.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Quality assurance:\"}),\" Quality assurance is crucial to ensure that the product meets the desired standards and functions as intended. Testing should be performed regularly throughout the development process to identify any bugs or issues and fix them promptly.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h2\",{children:\"2.4 Testing & Release\"}),/*#__PURE__*/e(\"p\",{children:\"Developing and testing a DeFi prototype is a crucial step in bringing a platform to life. Followingsteps should be followed to ensure that the product functions as intended and delivers the desired user experience.\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Allocate testing time: \"}),\"The testing time should be allocated based on the release platform, whether it's mobile or web. This will ensure that the product is thoroughly tested on the specific platform to identify any issues or bugs.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Test together: \"}),\"The testing should be done collaboratively, with the entire team participating to ensure that all aspects of the product are tested. This will help identify any bugs or issues that may have been missed by individual testers.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Make fixes: \"}),\"Any issues or bugs found during testing should be addressed promptly. The team should work together to make fixes possible before the product is released to customers. This will ensure that the product functions as intended and delivers the desired user experience.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Down bugs: \"}),\"If any bugs or issues are not addressed before release, they should be noted and discussed in the next product meeting. This will help the team identify patterns in bugs and develop strategies to prevent them in future releases.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Ensure compatibility:\"}),\" The product should be tested on different platforms and devices to ensure that it is compatible with a variety of systems. This will help ensure that the product reaches the widest possible audience and functions seamlessly across different platforms.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Provide documentation: \"}),\"The product should come with documentation that outlines its features, functionality, and any known issues. This will help users understand how to use the product and troubleshoot any issues they encounter.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Communicate with customers: \"}),\"Once the product is released, the team should actively communicate with customers to gather feedback and address any issues that arise. This will help build a loyal user base and ensure that the product remains relevant and competitive.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h2\",{children:\"2.5 Product Team Structure\"}),/*#__PURE__*/e(\"p\",{children:\"A DeFi startup requires a team of both technical and managerial personnel. Here are some key roles that may be included in such a team:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Product Manager:\"}),/*#__PURE__*/e(\"br\",{}),\"This role is responsible for overseeing the development cycle and ensuring that the team meets its goals. The Product manager does not decide what to build, but rather ensures that the product is delivered on time and to the satisfaction of the customer.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Technical Lead:\"}),/*#__PURE__*/e(\"br\",{}),\"This is an experienced technology person on the team who grades tasks based on their complexity and derives the overall solution design. The Technical Lead is responsible for ensuring that the technical aspects of the product are sound and align with the product goals.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Product Designer:\"}),/*#__PURE__*/e(\"br\",{}),\"This role is responsible for user research, participating in specs creation, and designing the user experience of the product. The Product Designer works closely with the Technical Lead and Software Developers to ensure that the product is both technically sound and user-friendly.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Software Developers:\"}),/*#__PURE__*/e(\"br\",{}),\"This team consists of two to three developers with a Quality Assurance (QA) specialist. The number of developers required depends on the selected Blockchain and product technology and platform (mobile or web). The Software Developers work closely with the Technical Lead and Product Designer to ensure that the product is developed according to the specifications and goals set forth by the Product manager.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h1\",{children:\"3. Technology Stack\"}),/*#__PURE__*/e(\"p\",{children:\"Creating a detailed technical design for a DeFi startup involves a careful examination of the platform's requirements and goals. The tech team must have a thorough understanding of the technology and tools available. Following are the technologies that will handle the required job of creating a DeFi:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Smart Contract Programming Languages:\"}),\" Rust, Solidity, JavaScript, Vyper are good choices.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Front-end frameworks:\"}),\" React, Angular, Vue.js and Flask(Python) can be considered.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Back-end development:\"}),\" Node.js, Python, Ruby, C# can be used for backend development.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Database technology:\"}),\" MySQL, SQL, PostgreSQL and MongoDBare good choices as they are known to be secure and scalable.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Security:\"}),\" Tools such as SSL certificates, encryption, and two-factor authentication can be used.\"]})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Testing and deployment:\"}),\" Tools such as Truffle, Ganache, and Hardhat can be used to test and deploy smart contracts to the Blockchain.\"]})})]}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h1\",{children:\"4. Launch Platforms Like Mobile or Web App\"}),/*#__PURE__*/e(\"p\",{children:\"To present your DeFi platform, you must choose the appropriate web or mobile application. Choosing the right technologies to build your platform's front and back ends is essential to ensure a seamless user experience, scalability, and security. Popular front-end web technologies include React, Angular, and Vue.js, while popular back-end web technologies include Node.js, Python, and Ruby on Rails. For mobile applications, popular choices include React Native and Flutter. It's essential to consider factors such as developer experience, community support, and scalability when choosing a framework.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h1\",{children:\"5. Deployment on a Blockchain Network\"}),/*#__PURE__*/e(\"p\",{children:\"Now, the DeFi platform must be deployed on any Blockchain platform of your choosing. You need to select the appropriate Blockchain platform based on your specific needs such as scalability, transaction speed, and cost.\"}),/*#__PURE__*/e(\"h4\",{children:/*#__PURE__*/e(\"strong\",{children:\"Top 10 Blockchain platforms\"})}),/*#__PURE__*/e(\"p\",{children:\"(Note:The costs mentioned are the minimum costs as of 28 Feb, 2022)\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:\"Once you have selected the Blockchain platform, you will have to create the necessary smart contracts and deploy them on the Blockchain. This involves writing the code for the smart contracts, testing them thoroughly for bugs and vulnerabilities and then deploying them on the selected Blockchain network. You will also need to set up the infrastructure for the centralized components of your platform such as the database and user interface. This involves setting up servers and databases and integrating them with the Blockchain network. Once the deployment is complete, it is important to monitor the platform and address any issues or bugs that arise. Regular updates and maintenance should also be performed to ensure the platform continues to function optimally and remains secure.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h1\",{children:\"6. Best Clouds Available for DeFi Platforms\"}),/*#__PURE__*/e(\"p\",{children:\"When choosing the best cloud for your DeFi startup, there are several factors to consider ensuring that your application is reliable, scalable and secure. With the increasing popularity of DeFi, many cloud providers are now offering specialized services for hosting and scaling DeFi applications, making it easier for developers to build and deploy innovative applications. Some of the most popular cloud platforms comparison are shown in the figure below:\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"h1\",{children:\"7. DeFi Product Risk Factors\"}),/*#__PURE__*/e(\"p\",{children:\"Key points of DeFi product risk factors for a startup include:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Smart contract risk: Smart contract risk in DeFi refers to the potential security vulnerabilities in the code that governs the rules of a DeFi protocol, which can lead to financial losses and reputational damage if exploited by attackers.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Liquidity risk: Liquidity risk in DeFi refers to the possibility of a project failing to attract enough liquidity providers, resulting in lower trading volumes and potential price manipulation, which can negatively impact the viability and sustainability of the project.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Market risk: Market risk in DeFi refers to the potential impact of the volatility of the crypto currency market on the value of a project's tokens and the viability of the project.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Regulatory risk: Regulatory risk in DeFi refers to the possibility of regulatory oversight, particularly in areas such as anti-money laundering and know-your-customer compliance, which can pose legal and compliance challenges for DeFi projects.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cyber security risk: Cyber security risk in DeFi refers to the potential for security breaches or hacks of DeFi protocols, which can result in the loss of user funds and damage the reputation of the project.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Operational risk: Operational risk in DeFi refers to the possibility of downtime or technical failures, which can negatively impact the user experience and credibility of the project.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Financial risk: Financial risk in DeFi refers to the potential impact of market fluctuations, liquidity constraints, and operational costs on the sustainability of the project.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h1\",{children:\"8. DeFi Compliance by Design\"}),/*#__PURE__*/t(\"p\",{children:[\"DeFi compliance by design is a proactive approach to ensuring that decentralized finance (DeFi) applications meet regulatory requirements and industry best practices. The approach involves integrating compliance requirements into the design and architecture of DeFi applications rather than adding compliance features as an afterthought. The goal is to create a more secure and trustworthy environment for users and investors while maintaining the decentralization and transparency that are core features of the DeFi ecosystem. By adopting the DeFi compliance by design approach, DeFi developers can mitigate the compliance challenges and reputational risks that have affected some projects in the past. They can position themselves as responsible and trustworthy players in the ecosystem which can help to attract users and investors in the long term. Compliance by design can also help to balance the benefits of decentralization with the need for compliance with regulatory and industry standards ensuring the long-term viability and sustainability of the DeFi ecosystem.\",/*#__PURE__*/e(\"br\",{}),\"Developing and launching a DeFi platform also requires compliance with laws and regulations such as \",/*#__PURE__*/e(\"strong\",{children:\"AML\"}),\", \",/*#__PURE__*/e(\"strong\",{children:\"KYT\"}),\" and \",/*#__PURE__*/e(\"strong\",{children:\"KYC\"}),\" to avoid legal difficulties and prevent financial crimes. It is important to work with legal counsel and compliance experts to understand specific requirements and implement robust KYC processes. Other laws and regulations such as data protection, tax, and securities regulations should also be considered to ensure the platform operates ethically and protects its users' interests. Being proactive in identifying and addressing compliance concerns is key to a successful DeFi platform.\"]}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h1\",{children:\"9. DeFi Security\"}),/*#__PURE__*/e(\"p\",{children:\"In order to conduct a professional security audit of your DeFi platform, the first step is to identify a reputable security audit firm that specializes in Blockchain and smart contracts security. This company ought to have a track record of successfully completing security audits for other DeFi projects. The security audit company should then carefully evaluate the smart contracts and the overall system architecture. This involves a deep dive into the code, identifying potential security vulnerabilities and testing the system for potential exploits. The security assessment company should also offer suggestions on how to fix any found vulnerabilities. Once the security audit is complete, it is important to implement the recommendations and make any necessary changes to the platform to improve its security. Regular security audits should be conducted to ensure the platform remains secure and free of vulnerabilities.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h1\",{children:\"10. DeFi Quality Assurance\"}),/*#__PURE__*/e(\"h2\",{children:\"10.1 Performance Monitoring and Scaling\"}),/*#__PURE__*/e(\"p\",{children:\"Now that everything is operational, monitoring the performance of your DeFi platform is crucial to ensure its smooth operation and scalability. Data should be gathered considering the usage of the platform and its components. This data can include metrics such as the number of users, the volume of transactions and the average time taken for transactions to be processed. Additionally, it's important to monitor the performance of smart contracts as any bugs or vulnerabilities can have significant impacts on the platform's performance and user experience. Once data is collected, it can be analyzed to identify areas where improvements can be made. For example, if transactions are taking too long to process, the platform's scalability can be improved by adding more nodes to its network or optimizing its algorithms. If smart contracts are vulnerable to attack, the platform's security can be improved by auditing the code and implementing better security measures.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h2\",{children:\"10.2 Backup and Disaster Recovery\"}),/*#__PURE__*/e(\"p\",{children:\"Implementing backup and disaster recovery measures are as important as security of your DeFi platform. Some of the measures for backup and disaster recovery includes:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Robust backup measures must be implemented, including testing backups regularly to ensure their reliability.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A failover mechanism, such as a secondary network or server, should be in place and tested regularly in the event of a disaster.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A well-trained response team is essential to ensure the rapid recovery of the platform in case of a disaster.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h1\",{children:\"11. Integration with other DeFi Protocols\"}),/*#__PURE__*/e(\"p\",{children:\"Last but not least, integrating your DeFi platform with other existing DeFi protocols and services is a way to increase its usability and reach. Identify other protocols that complement your platform and have a large user base. Build strong relationships with the teams behind these protocols and implement the integration, making sure it is secure and functional before launching it to the public. This could include popular decentralized exchanges (DEXs), lending and borrowing protocols and tokenization platforms.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h1\",{children:\"Conclusion:\"}),/*#__PURE__*/e(\"p\",{children:\"Inconclusion, DeFi development is a complex and rapidly evolving fieldbut with the right approach, it is possible to turn a DeFi conceptinto a successful minimum viable product. By following the stepsoutlined in this comprehensive guide, you can minimize the risksassociated with DeFi development and maximize your chances ofsuccess. From defining your concept and conducting market research tobuilding your platform and launching it to the market, this guideprovides a roadmap for complete DeFi development. However, it isimportant to remember that DeFi development is an ongoing process andit's essential to regularly monitor the performance of your platform,make adjustments as needed and plan for backup and disaster recoverymeasures.\"})]});export const richText10=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"Since 2009 the blockchain has a huge impact on the market and make the people to realize the power of blockchainits potential. At that time the real-life scenarios of the blockchain were limited to payments but after releasing of Ethereum there was huge bull run in the blockchain market. \\xa0 \\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Ethereum helps in establishment of blockchain in real life such as games, web apps and many more. With the evolution of blockchain era, many new issues are arising and one of the top\u2019s issues is Scalability issue.\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"One of the limitations we faced from the blockchain is its scalability issue. Sidechain is one of the solutions for improving the scalability of the blockchain. Increasing in scalability of blockchain will help in regularizing the blockchain technology in our real-world application.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"High-cost transaction also discouraging the people. In the case of Ethereum based decentralized application, the user cannot afford such transaction fee. Scalable solutions are providing low-cost fee even some solutions provide zero fee transactions.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Today, roughly Ethereum can process 13 transactions per second which is small number. For competing with the currently available solutions, the scalability is very necessary for the network.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Scalability Solutions: \u2013\"})}),/*#__PURE__*/e(\"p\",{children:\"Scaling of the Ethereum network off the main net is also known as Layer 2. There are many different types of Layer 2 Solution.\"}),/*#__PURE__*/t(\"ol\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Rollups\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"ZK rollups\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Optimistic rollups\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"State channels\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Plasma\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Validium\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Sidechains\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Hybrid solutions\"})})]}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://web.archive.org/web/20210919103719/https://matter-labs.io/\",motionChild:!0,nodeId:\"KoVAe68wF\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Matter Labs\"})}),\" helps in distinguishing the available different scalability solutions. Here is the comparison of these solutions on the basis of following categories. \\xa0\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Security\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Performance\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Usability\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Other Aspects\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"br\",{className:\"trailing-break\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"Plasma & Sidechains: \u2013\"}),\" \\xa0 \\xa0\"]}),/*#__PURE__*/e(\"p\",{children:\"Our article is mainly focused on the Plasma and Sidechain as well as their applications use case. Moreover, the differentiation of solutions based on the plasma and sidechain is also an important aspect of this article. Here is the pictorial representation of the Plasma, Sidechains, Plasma Chain connectivity with the main net as well as their important properties.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Comparison:\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(n,{href:\"https://web.archive.org/web/20210919103719/https://matic.network/\",motionChild:!0,nodeId:\"KoVAe68wF\",openInNewTab:!1,scopeId:\"contentManagement\",smoothScroll:!1,children:/*#__PURE__*/e(i.a,{children:\"Matic\"})}),\" network\u2019s research helps in comparing some of these chains.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Sidechains\"})}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"What is sidechain?\"})}),/*#__PURE__*/e(\"p\",{children:\"=> Sidechain is basically a separate chain in parallel with the main chain. The sidechain provides facility of transferring digital assets or token between these two chains.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Ethereum based Sidechains: \u2013\"})}),/*#__PURE__*/e(\"p\",{children:\"\\xa0 \\xa0 \\xa0 \\xa0 \\xa0 \\xa0Ethereum based sidechains are similarly those chains which are running parallel to the Ethereum network with their own consensus algorithm and token as well. There are many Ethereum based sidechains and continue to grow with the time. Some of the Ethereum based sidechains are listed below:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"xDai\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Incognito\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Skale\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"PoA\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"xDai:-\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"\\xa0 \\xa0 \\xa0 \\xa0 xDai \"}),\"is a sidechain of Ethereum aims to provide high scalable and less costly network. xDai provides stable price cryptocurrency and It has two tokens:\"]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"DAI\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Stable token used for transactions, payments and fees\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Pegged to US Dollar\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"xDai Stake\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Governance token used for supporting the underlying Proof-of-Stake Consensus.\"})})]}),/*#__PURE__*/e(\"p\",{children:\"The stable coin nature of the xDai increase its usage in real world applications. It helps in moving assets between main net using Dai-xDai bridge. The xDai Bridge converts Dai to xDai and vice versa.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Use Case:\"})}),/*#__PURE__*/e(\"p\",{children:\"\\xa0 \\xa0 \\xa0 \\xa0 xDai ecosystem has a huge potential in the project & Dapps sections. Development based on xDai ecosystem is fast adaptive. There are already many sections which have been targeted.\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Peer-to-Peer Payments.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"DeFi\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Community Currencies\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Prediction Markets\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Blockchain Games\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"NFT\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"B2B & Enterprise Applications.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"PoA:-\"})}),/*#__PURE__*/e(\"p\",{children:\"\\xa0 \\xa0 \\xa0 \\xa0 PoA \\xa0core cover a blockchain and as well as provide the facility of product development for the Ethereum ecosystem.\"}),/*#__PURE__*/t(\"p\",{children:[\"\\xa0 \\xa0 \\xa0 \\xa0 \\xa0\",/*#__PURE__*/e(\"strong\",{children:\"Features:\"})]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"As a sidechain to Ethereum, PoA is using the Proof of Authority for its consensus.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"5 second block time\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"A full block on POA costs less than .01 cent.\"})})]}),/*#__PURE__*/t(\"p\",{children:[\"\\xa0 \\xa0 \\xa0 \\xa0 \\xa0\",/*#__PURE__*/e(\"strong\",{children:\"Use Cases: \u2013\"})]}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Games\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Local Currency\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Subsidized Transaction\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Defi\"})})]}),/*#__PURE__*/e(\"p\",{children:\"\\xa0 \\xa0 \\xa0 \\xa0 \\xa0Some of the POA based Dapps are:\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Geon App\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"POA Bridge\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Dope Raider and many more.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Incognito: \u2013\"})}),/*#__PURE__*/e(\"p\",{children:\"\\xa0 \\xa0 \\xa0 \\xa0 \\xa0 Privacy aimed Ethereum side chain and provides less costly and fast transaction on the chain with the usage of Proof of stake consensus algorithm.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Features:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Can be attached to any blockchain to conduct confidential transfer of assets.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Using this bridge, anyone can turn on privacy for their tokens and shield their balances and activity.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"40 second block time\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"SKALE:\"})}),/*#__PURE__*/t(\"p\",{children:[/*#__PURE__*/e(\"strong\",{children:\"\\xa0 \\xa0 \\xa0 \\xa0N.O.D.E \"}),\"foundation built a sidechain as a solution to the scalability of Ethereum. This project was named SKALE Network.\"]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Features:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gives developers the ability to easily provision highly configurable fully decentralized chains that are instantly compatible with Ethereum.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Proof of stake is used as a consensus algorithm in SKALE.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Employing multiple sidechains.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Deploy scale sidechains quickly\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Smart contract processing.\"})})]}),/*#__PURE__*/e(\"h5\",{children:/*#__PURE__*/e(\"strong\",{children:\"Plasma\"})}),/*#__PURE__*/e(\"p\",{children:\"Plasma is one of the important layer2 solutions. It\u2019s basically a framework that helps in increasing transaction throughput. It provides the functionality of building smart contract on top of it. There are many providers which have make it easy to develop plasma-based chains. The chains which are built on the plasma are called plasma chains.\"}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Loom\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Polygon (previously known as Matic Network)\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gluon\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gazelle\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"LeapDAO\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"VALIDIUM\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"OMG Network\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Loom: \u2013\"})}),/*#__PURE__*/e(\"p\",{children:\"Loom network is one of the scaling solutions of Ethereum which provides faster transactions and empower the decentralized applications by using plasma at its core.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Features:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Cross Chain integration.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"LOOM token is used for securing the Loom Network\u2019s main net\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Developer use Loom token for hosting Dapp.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Loom Network runs on Delegated Proof of stake\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Ready-made Solution for developers.\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Matic: \u2013\"})}),/*#__PURE__*/e(\"p\",{children:\"Layer 2 solution for the scalability of the Ethereum with the adoption of Plasma and using Proof of Stake based side chains.\"}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Features: \u2013\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Provide APIs and SDKs for fast and easy development. Few steps are for integration of Matic on the Dapps.\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Highly Scalable\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"High Throughput (65K transactions/second)\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Use Cases:\"})}),/*#__PURE__*/t(\"ul\",{children:[/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Decentralized Exchanges\"})}),/*#__PURE__*/e(\"li\",{\"data-preset-tag\":\"p\",children:/*#__PURE__*/e(\"p\",{children:\"Gaming\"})})]}),/*#__PURE__*/e(\"p\",{children:/*#__PURE__*/e(\"strong\",{children:\"Wrapping it up:\"})}),/*#__PURE__*/e(\"p\",{children:\"\\xa0 \\xa0 \\xa0 \\xa0 \\xa0Scalability of the Ethereum network can be ensured by any of the above mechanism but it depends upon the use case. In some use case the no of transaction per second could be the first priority. But overall Matic is the efficient solution for solving the scalability of the blockchain. These solutions could result in growing of the blockchain in the real-life application.\"})]});export const richText11=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"At that time the real-life scenarios of the blockchain were limited to payments but after releasing of Ethereum there was huge bull run in the blockchain market. Ethereum helps in establishment of blockchain in real life such as games, web apps and many more. With the evolution of blockchain era, many new issues are arising and one of the top\u2019s issues is Scalability issue.\"})});export const richText12=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"With the smart contracts, there is no need of any physical form to prove your ownership of assets. Moreover, due to the transparent nature of the blockchain, the ownership of the assets can be verified easily.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"\\xa0\"}),/*#__PURE__*/e(\"h5\",{children:/*#__PURE__*/e(\"strong\",{children:\"Tradition Contracts\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"1-3 Days\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Manual Remittance\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Physical Presence\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Expensive\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Lawyer Necessary\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h5\",{children:/*#__PURE__*/e(\"strong\",{children:\"Smart Contracts\\xa0\"})}),/*#__PURE__*/e(\"p\",{children:\"Minutes\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Automatic Remittance\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Virtual Presence\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Fraction of Cost\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Lawyer may not be necessary\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h4\",{children:\"How do smart contracts work?\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"A computer program has some core parts which are included in every program. These components of the program are function, if else statements, variables etc. The same way smart contracts have function, if else statements and variable and these are the building blocks of the smart contracts.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Specific part of the code run when some condition is met and action is performed. This action includes send money , registering a house, transfer ownership of the house etc.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h5\",{children:\"Smart Contract Working | Block360 | Blockchain\"}),/*#__PURE__*/e(\"p\",{children:\"Image Source: Edureka\"}),/*#__PURE__*/e(\"p\",{children:\"Benefits of Smart Contract:\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Speed, Efficiency and Accuracy\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"p\",{children:\"Since smart contracts are computer program and run immediately after some state. There\\xa0 is no need of paperwork and physical presence of the person to fulfil the agreement.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Trust and Transparency\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Smart Contract are deployed on the blockchain network which make it transparent.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Information is accessible and easy to validate which makes a trust between parties.\\xa0\\xa0\"}),/*#__PURE__*/e(\"h4\",{children:\"Security\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Blockchain is high secure network and cannot be compromised easy due to highly\\xa0 encryption and connectivity. It\u2019s not possible to hack the blockchain because he has to\\xa0 change the entire chain.\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h4\",{children:\"Savings\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"In the agreement between parties, there is always an intermediate entity which takes\\xa0 time as well as money. Smart contract removes that entity, save associated money and\\xa0 time.\"}),/*#__PURE__*/e(\"p\",{children:\"Platform to deploy Smart Contracts:\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Ethereum\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Smart Contract Language: Solidity\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Polkadot\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Smart Contract Language: Depends on the selected chain\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Hyperledger\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Smart Contract Language: Javascript, GO\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Tezos\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Smart Contract Language: Michelson\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Stellar\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Smart Contract Language: Net, Scala, C++, GO\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Solana\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Smart Contract Language: C, Rust\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Corda\"}),/*#__PURE__*/e(\"p\",{children:\"Smart Contract Language: Java, Kotlin, DAML\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Cardano\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Smart Contract Language: Plutus, Marlowe, Solidity and many others\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Tools for writing and deploying Smart Contracts\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h5\",{children:\"1. Truffle\"}),/*#__PURE__*/e(\"p\",{children:\"Truffle is a development framework for the Ethereum. It has all the tools that are required\\xa0 for building smart contract from scratch to production ready.\\xa0\"}),/*#__PURE__*/e(\"h5\",{children:\"2. Mist Browser\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"A separate browser for interacting with the decentralized applications.\\xa0\"}),/*#__PURE__*/e(\"h5\",{children:\"3. Metamask\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Metamask is a cryptocurrency wallet used for interacting with the Ethereum based\\xa0 networks.\\xa0\"}),/*#__PURE__*/e(\"h5\",{children:\"4. Remix\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Remix is a web-based IDE that is used for writing, compiling, deploying and interacting with the smart contracts.\\xa0\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h4\",{children:\"Conclusion:\"}),/*#__PURE__*/e(\"p\",{children:\"With the passage of time smart contracts are evolving and many other platforms have been introduced. Smart Contract has taken a revolution in the world of technology and change the ways for handling money. The understanding of the smart contract is very important because in the future all the assets will be handled by these contracts.\"})]});export const richText13=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"The same way we have digital contracts which are written as program and execute automatically after some conditions are met. These programs are solving many real-world problems because of its automation and security. Since without these smart contracts, everyone should need to have a physical contract to prove something. Moreover, the validity of that physical contract is another issue which we were facing. So, with the evolution of the blockchain era, these problems have been solved by developing smart contracts.\"})});export const richText14=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"p\",{children:\"The golden one these days is the Internet of Things. Wondering what IoT truly is? The internet became public less than three decades ago, but it did not take long for it to become mainstream. It has become the lifeblood of the modern world, but it owes this proliferation to an exponential rise in computational power of our devices.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h4\",{children:\"IOT Blockchain\\xa0\"}),/*#__PURE__*/e(\"p\",{children:\"Anyway, I am not sitting here trying to talk about the awesomeness of the mainstream Internet, but about the buzz word of IoT thrown around wherever you go. Unlike many others, IoT is no longer just a word, it has proliferated into our lives enough that it is saving lives be it through medical devices, vehicles, or simple safety gadgets.\"}),/*#__PURE__*/e(\"p\",{children:\"Now IoT is no rocket science. In the simplest of terms, it is a bunch of things interconnected via the internet. When you think of things and the internet, you may not even go beyond your phone, laptop, and smartwatch, but when we say things, we really mean things. Your washing machine? Your door? Your pets? Your kids? You name it and you can connect it to the internet.\"}),/*#__PURE__*/e(\"p\",{children:\"This sounds scary on the surface, but if you use the internet, you are already leaving tons of your data there. IoT just means machines will share the data on the internet without you making any efforts. In fancier words: machine to machine communication.\"}),/*#__PURE__*/e(\"p\",{children:\"Fun fact, the concept of IoT had been brewing for decades but the term IoT is not all that new either. It was first introduced in 1999 by Kevin Ashton presenting RFID to P&G\u2019s senior management.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h4\",{children:\"Key Components of an IoT system\"}),/*#__PURE__*/e(\"p\",{children:\"All smart devices come with embedded sensors but not every smart device is an IoT device. A device must have the following components to qualify as an IoT device:\"}),/*#__PURE__*/e(\"h5\",{children:\"IOT Blockchain\"}),/*#__PURE__*/e(\"p\",{children:\"1.Devices: Sensors gather the information at the point of activity. It could be biological, environmental, visual, auditory, or any combination of these.\"}),/*#__PURE__*/e(\"p\",{children:\"2.Communication: A communication channel like Wifi, Cellular network, in combination with short-range capabilities like Bluetooth, NFC etc communicates the sensed data to a storage space.\"}),/*#__PURE__*/e(\"p\",{children:\"3.Data storage and consolidation: The information gathered by all the sensors is communicated generally to a cloud-based storage space. This raw data may be processed along with information from other sources to extract useful information.\"}),/*#__PURE__*/e(\"p\",{children:\"4.Information portal: The end user of the product, be it a consumer, a commercial user or just a machine, obtains the information through a portal that usually offers analytical insights.\"}),/*#__PURE__*/e(\"p\",{children:\"If you still don\u2019t believe much in the computing power of modern computers, I have another fun fact for you. The smartphone in your hand is more powerful than all of NASA\u2019s computing power combined, back when it landed on the moon in 1969. In comparison to the Apollo Guidance Computer, your smartphone is a supercomputer and you are about to discover the wonders these computers can do for you.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h4\",{children:\"IoT in the Real World\"}),/*#__PURE__*/e(\"h5\",{children:\"IoT Blockchian\"}),/*#__PURE__*/e(\"p\",{children:\"There are tons of companies luring us to get products that would let us turn our lights on and off with a tap on our smartphone but IoT is so much more than that. Here are some of the applications that are working all around you.\\xa0\"}),/*#__PURE__*/e(\"h5\",{children:\"Smart Homes\"}),/*#__PURE__*/e(\"p\",{children:\"A self cleaning home may be a slightly distant future, but your devices have become capable of regulating themselves. Along with the known electronics companies like Philips and Haier, many startups like Nest have made their place in the IoT market. May it be a doorbell with facial recognition, a self-learning thermostat, automated lighting or a smart toothbrush, it is all out in the market. Virtual assistants in the form of Google Home and Amazon Alexa are already in our homes, but more innovations are on the horizon with concepts like Moley, the robotic kitchen. Similar ideas scaled to a larger level will demonstrate a smart city. If we are fortunate, we will be seeing a real-life example of such a city in Dubai by 2021.\"}),/*#__PURE__*/e(\"h5\",{children:\"Medical IoT\"}),/*#__PURE__*/e(\"p\",{children:\"IoT devices in the healthcare cover many different categories from location tracking, fitness tracking, life enhancements, to vital signs gathering. There are tiny chips to monitor heart activity, little patches to treat allergies, blood sugar monitors, all of which measure and relay information without involving humans.\"}),/*#__PURE__*/e(\"h5\",{children:\"IoT in business\"}),/*#__PURE__*/e(\"p\",{children:\"Many businesses use IoT devices to streamline their processes from RFID security, activity tracking wearables, inventory tracking, to remote working. The ease of data sharing only enhances productivity and efficiency in business processes.\"}),/*#__PURE__*/e(\"h5\",{children:\"Connected Cars\"}),/*#__PURE__*/e(\"p\",{children:\"Cars may have been simple machines but the connected car technology is changing the game. It involves a complex network of sensors and embedded software paired with powerful communication technologies paving way for cars that will drive themselves one day.\"}),/*#__PURE__*/e(\"h5\",{children:\"Industrial IoT\"}),/*#__PURE__*/e(\"p\",{children:\"IoT is changing our lives one thing at a time but it is entirely revolutionizing the industry. The fourth Industrial revolution is all about the Internet of Things especially with 5G cellular network pitching in with incredibly high data rate, reduced latency, and exceptional data saving. Industry 4.0 is prepared to automate production, streamline processes, enable machine to machine communication, all through acquiring, analyzing, and processing data from IoT devices.\"}),/*#__PURE__*/e(\"h5\",{children:\"IoT and Energy\"}),/*#__PURE__*/e(\"p\",{children:\"IoT systems offer much-needed solutions in a world where resources are scarce and a large percentage of energy is being wasted. It is giving rise of self-sustainable buildings that consume as much energy as they produce by deploying IoT systems in the form of smart energy grids and energy monitoring systems. It begins small with devices that let you regulate appliances remotely but on a large scale it adds up, with the possibility of making the world energy sufficient without delving into the non-renewable sources like coal and oil.\"}),/*#__PURE__*/e(\"h4\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"The Internet of Things sounds like the most wonderful solution to many of our problems, but it comes with some woes of its own. Smart energy grids, industrial machines, or a simple camera in your home is all great until the communication channel gets compromised. A company making light bulbs yesterday has to turn into a software company today, a task they can not possibly have experience with.\"}),/*#__PURE__*/e(\"p\",{children:\"IoT security is complex, and its large scale makes it vulnerable to malicious attacks. Many policies and regulations are in place to ensure people\u2019s data is not violated but the growth of technology requires continuous consideration into updating policies as well. However, firms invested $1.5 billion on IoT security alone in 2018 as Gartner reports which speaks both about the importance and the efforts invested into the matter.\"}),/*#__PURE__*/e(\"p\",{children:\"The world is exploring the solution to IoT security troubles in blockchain technology and it looks quite promising so far. Together, IoT and Blockchain can make for a very different world \u2014 a world where digital transformation becomes a pervasive reality.\"})]});export const richText15=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Every few years, the tech world drops a new word and it goes buzzing around the world. The hype goes wild, controversies grow, and endless arguments begin between the proponents and the critics. The golden one these days is the Internet of Things. Wondering what IoT truly is? The internet became public less than three decades ago, but it did not take long for it to become mainstream. It has become the lifeblood of the modern world, but it owes this proliferation to an exponential rise in computational power of our devices.\"})});export const richText16=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h4\",{children:\"Enterprise Privacy Requirements\"}),/*#__PURE__*/e(\"p\",{children:\"One of the reasons enterprise-grade solutions are difficult is the need for compliance with as many regulations as applicable. Gartner predicts that within a few years most of the blockchains will suffer from privacy poisoning, wherein they will be carrying sensitive data that would and be in direct violation of privacy laws. Even if the data does not contain any personally identifiable data, companies may still want to keep certain things private, which is not possible with public blockchains. The very transparency and immutability that we value in public blockchains make them unsuitable for the enterprise.\"}),/*#__PURE__*/e(\"p\",{children:\"Moreover, privacy of the network is another important aspect that most enterprises require. Access to the chain in and of itself should be regulated such that, unlike a public chain, the barrier to network entry is not simply computing power but also permission from the network owners or regulators. To put it simply, the network should be permissioned so that access is not given away to just anyone.\"}),/*#__PURE__*/e(\"p\",{children:\"Quorum tackles both these aspects of privacy and permissioning, marking itself as the major contender in the enterprise blockchain space.\"}),/*#__PURE__*/e(\"h5\",{children:\"Two-Pronged Privacy\"}),/*#__PURE__*/e(\"p\",{children:\"Privacy is an inherent feature of Quorum that allows you to create private contracts just as easily as a public contract. This is made possible by two components: the Private State and the Private Transaction Processor.\"}),/*#__PURE__*/e(\"h5\",{children:\"The Private State\"}),/*#__PURE__*/e(\"p\",{children:\"Most blockchains have a centralized state \u2014 one ledger for all \u2014 which is public and eventually consistent for every active node in the network i.e. the Public State, uniform for everyone. Quorum introduces the concept of Private State in addition to the Public State, such that while everyone will maintain the same version of the Public State, their Private State may vary according to what they are privy to, which means that it is highly likely that no two nodes will have the same Private State. What a person is privy to is indicated by an additional privateFor field in the transaction API. We will discuss this further in the next few sections.\"}),/*#__PURE__*/e(\"h5\",{children:\"The Private Transaction Processor\"}),/*#__PURE__*/e(\"p\",{children:\"Quorum developers have made very well-encapsulated changes to the Ethereum core presumably in order to avoid complicating the process of pulling updates from the core. If you wanted to create a private Ethereum network without private transactions, you can use the Quorum gethwith the consensus mechanisms they maintain, namely Raft or IBFT. Such a network would allow you to make public transactions only.\"}),/*#__PURE__*/e(\"p\",{children:\"If, however, you choose to use Quorum, you will also have to deploy another component that enables private transactions. The Private Transaction Processor is basically responsible for managing key pairs for nodes \u2014 note that these keys are different than the geth keys \u2014 and for storing and allowing access to encrypted transactions. The key pairs are generated by this component and while the private key remains in its Crypto Enclave, it shares the public key with others and stores public keys of others as well. You can learn more about the architecture and functionality here.\"}),/*#__PURE__*/e(\"p\",{children:\"A few implementations exist, including Constellation (Haskell) and Tesseract (Java), which are official, and Crux (Golang), which is a community contribution.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h4\",{children:\"How Private Transactions Work?\"}),/*#__PURE__*/e(\"p\",{children:\"Before we delve into the details, it must be noted that value transactions in Quorum are always public, probably so that there is never a doubt about the native currency in circulation. However, Quorum allows you to deploy private contracts, just as you would deploy a public contract, only with an additional field called privateFor(technically, there\u2019s also a privateFromto represent the sending party\u2019s public key, but it is not too important). The privateFor field constitutes an array of encoded public keys of the parties that this transaction needs to be shared with. Without the privateFor, this transaction is an ordinary, public one. But with this field, it is now apparent to the chain that this is a private transaction and it involves the help of another module that we call the Private Transaction Manager (Constellation/Tesseract, etc.).\"}),/*#__PURE__*/e(\"h5\",{children:\"Quorum Blockchain\"}),/*#__PURE__*/e(\"p\",{children:\"A private transaction is initiated by A, where B\u2019s key is provided in the privateFor field. Note that this is a regular plain text transaction.\"}),/*#__PURE__*/e(\"p\",{children:\"Since this is a private transaction, it will be forwarded to the Private Transaction Processor.\"}),/*#__PURE__*/e(\"p\",{children:\"The processor will internally share this with the Crypto Enclave, where the public key in privateFor will be used to encrypt the transaction. The encrypted transaction will be returned to the Transaction Manager.\"}),/*#__PURE__*/e(\"p\",{children:\"The Transaction Manager stores the encrypted transaction against its hash and also shares it with the intended recipient.\"}),/*#__PURE__*/e(\"p\",{children:\"The Transaction Manager returns the transaction hash to the Quorum node so that it can be added to the Public State as evidence of the occurrence of the transaction and disseminated to all the nodes.\"}),/*#__PURE__*/e(\"p\",{children:\"When the other nodes process this transaction, they check with their Transaction Managers whether this transaction hash is available to them.\"}),/*#__PURE__*/e(\"p\",{children:\"If the transaction is available to them, as is the case for party B, then the Transaction Manager can send it to the Crypto Enclave to decrypt the transaction and receive the transaction in clear text. This transaction is received by the Transaction Manager, it forwards this to the Quorum Node so that it can be executed. When party C asks its Transaction Manager to check if it has the transaction with the given hash, a negative response is returned.\"}),/*#__PURE__*/e(\"p\",{children:\"More details regarding this process can be found here.\"}),/*#__PURE__*/e(\"h5\",{children:\"Permissioned Network\"}),/*#__PURE__*/e(\"p\",{children:\"Permissioning is essentially bi-directional access control communication, which enforces the rules that specify which node is trustworthy and can be communicated with. Assume that there are 5 nodes that we can enumerate as A, B, C, D and E. I\u2019m in control of Node A. I permit it to communicate with B, C and D. Now if E were to contact me, its connections will be rejected, since E is not whitelisted.\"}),/*#__PURE__*/e(\"p\",{children:\"This whitelisting is done in a file called permissioned-nodes.json which is similar in format to the static-nodes.json file. Theoretically, everyone in the network could have separate files and that is bound to wreak havoc on the network, so it is recommended that every node has the same file. Even though this file can be changed while the node is running and the changes will be picked up by the node at run time, this is a very centralized process. There was talk of implementing an on-chain permissioning solution but an issue reported on their main repository suggests that it is being worked upon.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h4\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"Despite the limitations discussed regarding the permissioning, Quorum is definitely a solution to consider if you are building a private blockchain network. However, it must be noted that permissioning centralization is not just Quorum-specific \u2014 it is a concept common in most, if not all of the enterprise blockchains. Quorum allows storing private data, which is technically stored off-chain on its Transaction Manager, so it doesn\u2019t bloat the chain or amount to privacy poisoning. Making an educated guess here, but it seems that with Quorum, you could technically build a blockchain solution that complies with privacy regulations \u2014 if not out of the box, then with very few tweaks.\"})]});export const richText17=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"This article is a part of our series on enterprise blockchains, particularly focusing on Quorum. In the previous article, we presented a high-level view of Quorum and how it distinguishes itself from Ethereum, despite being forked from its source initially. Now, we want to talk about its privacy and permissioning capabilities and what our experimentation has taught us.\"})});export const richText18=/*#__PURE__*/t(a.Fragment,{children:[/*#__PURE__*/e(\"h4\",{children:\"Quorum Nodes\"}),/*#__PURE__*/e(\"p\",{children:\"In Ethereum, practically anyone can join the network, as long as they have the client code, easily accessible on Github, and a decent internet connection. Storage space could be a bit of a problem, but storage is relatively cheap, even in case of a full node, since as of writing this, the entire Ethereum main chain takes around 50GBs. Stating the obvious for the sake of clarity, in an Ethereum network, a node has the same copy of the ledger as everyone else does, since all transactions are public.\"}),/*#__PURE__*/e(\"p\",{children:\"Quorum, however, is a different beast altogether. Getting a Quorum node up and running means you not only require the client, but you will also need a corresponding Constellation node. These are an addition made necessary to fulfill the private transaction requirement. Constellation nodes are responsible for key management and encryption/decryption of the private transaction payloads, which we will further discuss with regard to private transactions. On top of that, every node will now keep track of a public state and the private state, where the former is the ledger of all the public transactions and the latter is where a node keeps track of all the data that it is privy to.\"}),/*#__PURE__*/e(\"h5\",{children:\"Consensus Mechanism\"}),/*#__PURE__*/e(\"p\",{children:\"There is no mining in Quorum since it uses Raft based consensus, which we will hopefully discuss in another article. It must be added that Quorum can also be used with the Istanbul Byzantine Fault Tolerance (IBFT) consensus protocol.\"}),/*#__PURE__*/e(\"h6\",{children:\"Permissioning\"}),/*#__PURE__*/e(\"p\",{children:\"Intended for B2B applications, Quorum has a requirement for enforcing permissions so that only a select group of nodes are allowed to participate in the network. A node is identified by its enode address, which is a long hex string.\"}),/*#__PURE__*/e(\"p\",{children:\"Permissioning, in Quorum, is based on a file, where you provide the enode addresses that are allowed to be a part of the network. Not only do you specify the enode address of every individual node that you want to allow your node to connect with, you will also append to it the IP address, port and the raft port of that node, which looks something like this: enode://3d9ca5956b38557aba991e31cf510d4df641dce9cc26bfeb7de082f0c07abb6ede3a58410c8f249dabeecee4ad3979929ac4c7c496ad20b8cfdd061b7401b4f5@127.0.0.1:21001?discport=0&raftport=50401.\"}),/*#__PURE__*/e(\"p\",{children:\"Permissioning is an option that can be used with the flag `permissioned` when using the client. This is bidirectional permission, where the whitelisted nodes will be allowed to make incoming connections and the node will be allowed to make outbound connections with them. There could be both permissioned and non-permissioned nodes in a Quorum network.\"}),/*#__PURE__*/e(\"h6\",{children:\"Private Transactions\"}),/*#__PURE__*/e(\"p\",{children:\"In Quorum, there are both public and private transactions, which means that you can create smart contracts that are public, but also ones that are only privy to a select few. It should be noted that transactions of value in Quorum remain public, the rationale being that the currency associated with the blockchain and its expenditure should remain forever transparent to every participant in the network.\"}),/*#__PURE__*/e(\"p\",{children:\"This is where the aforementioned Constellation nodes come in. The evidences (hashes) of private transactions are stored in the public ledger, however their payload is encrypted and only shared with those allowed to access that transaction. This is determined by the `privateTo` attribute in the transaction a client sends, which will include the public key \u2014 not the same as public address, but part of a key pair generated specifically for interaction with the Constellation node.\"}),/*#__PURE__*/e(\"p\",{children:\"\u200D\"}),/*#__PURE__*/e(\"h4\",{children:\"Conclusion\"}),/*#__PURE__*/e(\"p\",{children:\"Quorum provides a way to create private transactions and allows controlling access to chosen nodes in the network. It has a moderately active community behind it, nowhere close to the size of Hyperledger\u2019s following, though. The fact that it is based on Ethereum gives it a solid backbone, which has been extended with as little interference in the Ethereum core as possible. This is the first in our series of articles about Quorum, and Enterprise blockchains in general. In the next article of this series, we dive deep into Quorum\u2019s privacy and permissioning mechanisms, how they work and how well they work.\"})]});export const richText19=/*#__PURE__*/e(a.Fragment,{children:/*#__PURE__*/e(\"p\",{children:\"Since one of the most well known and well tested use case of blockchain is payment systems, it\u2019s no wonder financial institutions around the world are experimenting with it. While Ripple and Hyperledger are the ones more popular in this regard, another contender in the race of enterprise blockchain is Quorum. A project by JP Morgan Chase, Quorum is an Ethereum fork, which has been modified to add permissioning and private transactions. They have also added the raft consensus mechanism, which is their default mechanism. We will first discuss a quorum network in general and compare it with Ethereum, and then dive deeper into the specifics.\"})});\nexport const __FramerMetadata__ = {\"exports\":{\"richText6\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText16\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText1\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText11\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText19\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText7\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText17\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText10\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText18\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText13\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText3\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText5\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText14\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText8\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText9\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText15\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText12\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText4\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"richText2\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "+LAAsJ,IAAMA,EAAsBC,EAAIC,EAAS,CAAC,SAAS,CAAcD,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,SAAsBA,EAAE,SAAS,CAAC,SAAS,wCAAwC,CAAC,EAAE,0BAAuCA,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,SAAsBA,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,qCAAkDA,EAAE,SAAS,CAAC,SAAS,6CAA6C,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,MAAmBE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,gBAA6BA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,KAAkBA,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,eAA4BA,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,OAAoBA,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,uCAAoDA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,6BAA0CA,EAAE,SAAS,CAAC,SAAS,+CAA+C,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,mBAAgCE,EAAE,SAAS,CAAC,SAAS,kDAAkD,CAAC,EAAE,qCAAkDA,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,yBAAyB,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,YAAyBE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,aAA0BE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,sBAAmCE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,kEAA+EE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,iBAA8BA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,4BAAyCA,EAAE,SAAS,CAAC,SAAS,iEAAiE,CAAC,EAAE,GAAG,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kCAAkC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qBAAkCE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,mBAAgCA,EAAE,SAAS,CAAC,SAAS,4CAA4C,CAAC,EAAE,qCAAqC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,OAAoBE,EAAE,SAAS,CAAC,SAAS,8CAA8C,CAAC,EAAE,aAAmBA,EAAE,KAAK,CAAC,CAAC,EAAE,UAAuBA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,oDAAiEA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,kDAAkD,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,WAAwBE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,8CAA2DA,EAAE,KAAK,CAAC,CAAC,EAAE,aAAmBA,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,2BAAwCA,EAAE,KAAK,CAAC,CAAC,EAAE,aAAmBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,6BAA0CA,EAAE,KAAK,CAAC,CAAC,EAAE,aAAmBA,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,oCAAoC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,QAAqBE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,+BAA4CA,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,WAAwBA,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeC,EAAuBH,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,8DAAgD,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,6CAA0DE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,iBAA8BA,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,cAA2BA,EAAE,SAAS,CAAC,SAAS,yDAAyD,CAAC,EAAE,kBAAkB,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,sBAAmCE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,uBAAoCA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,EAAE,WAAwBA,EAAE,KAAK,CAAC,CAAC,EAAE,IAAiBA,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,IAAiBA,EAAE,SAAS,CAAC,SAAS,0DAA0D,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,IAAiBA,EAAE,SAAS,CAAC,SAAS,iDAAiD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oDAAoD,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,IAAiBE,EAAE,SAAS,CAAC,SAAS,qSAAuS,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,0BAAsBA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qDAAqD,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kJAAkJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,+FAA+F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBA,EAAE,IAAI,CAAC,SAAS,mEAAmE,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAC,oBAAiCE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,+EAA+E,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAEE,EAAE,CAAC,KAAK,sDAAsD,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBF,EAAEG,EAAE,EAAE,CAAC,SAAsBH,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,SAAS,CAAC,SAAS,0EAA0E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeI,EAAuBN,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+jBAA+jB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yfAAyf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0IAA0I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,ibAAib,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,sFAAsF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,kFAAkF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,mGAAmG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,qPAAqP,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,gDAAgD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,uFAAuF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,4CAA4C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,iOAA4N,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,oKAAoK,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,2KAA2K,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,0MAA0M,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,+LAA+L,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,kLAAkL,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,wGAAwG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,0GAA0G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,SAAS,CAAC,EAAE,oGAAoG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,UAAU,CAAC,EAAE,oFAAoF,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2RAA2R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,EAAE,wFAAwF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,4GAA4G,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,qNAAqN,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,CAAC,CAAC,CAAC,EAAeK,EAAuBP,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2WAA2W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2BAA2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yXAAyX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uXAAuX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8XAA8X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8MAA8M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4XAA4X,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yKAAyK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qCAAqC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6QAA6Q,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iKAAiK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mQAAoP,CAAC,CAAC,CAAC,CAAC,EAAeM,EAAuBR,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,qYAAgY,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+CAA+C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sDAAsD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8CAA8C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,wEAAwE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uDAAuD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kUAAkU,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yDAAyD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uEAAuE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,yFAAyF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,EAAE,qEAAqE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iQAA4P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mDAAmD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gDAAgD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,gEAAgE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gQAAgQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yEAAyE,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8DAA8D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,sEAAsE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uTAAkT,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mCAAmC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,MAAM,CAAC,sBAAsB,cAAc,EAAE,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,uEAAuE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gCAAgC,CAAC,EAAE,kEAAkE,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0bAA0b,CAAC,CAAC,CAAC,CAAC,EAAeO,EAAuBT,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,mLAAmL,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4XAA4X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kXAAkX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iaAAia,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oXAAoX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8XAA8X,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qTAAqT,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sXAAsX,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2VAA2V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iTAAiT,CAAC,CAAC,CAAC,CAAC,EAAeQ,EAAuBV,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4SAA6R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,+BAA+B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6UAA6U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iHAAiH,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,sKAAmLA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,4BAA4B,CAAC,EAAE,mIAAgJA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,8IAA8I,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,0BAA0B,CAAC,EAAE,0IAAuJA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,sGAAmHA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,wGAAqHA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAS,CAAcA,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,0HAA0H,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,8GAA2HA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,0HAAuIA,EAAE,KAAK,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,MAAM,CAAC,qBAAqB,OAAO,sBAAsB,eAAe,2BAA2B,MAAM,EAAE,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,oIAAoI,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kWAA6V,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0PAA0P,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uPAA6O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wNAA8M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gJAA2I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+OAA+O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,CAAC,CAAC,CAAC,EAAeS,EAAuBT,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,CAAC,CAAC,EAAeU,EAAuBZ,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wRAAwR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sZAAsZ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,sEAAsE,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4TAA4T,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uGAAuG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mRAAmR,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+RAA+R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mfAAmf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+WAA+W,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yRAAyR,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4OAA4O,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kWAAkW,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+NAA+N,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uPAAuP,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2DAA2D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yOAAyO,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mMAAmM,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oKAAoK,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6JAA6J,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+KAA+K,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mNAAmN,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6GAA6G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sDAAsD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,u4BAAu4B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wBAAwB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,q5CAAq5C,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,wCAAwC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oOAAoO,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uOAAuO,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kPAAkP,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wPAAwP,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sTAAsT,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAC,iCAA8CE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+NAA+N,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8KAA8K,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gLAAgL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wQAAwQ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sKAAsK,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2KAA2K,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oNAAoN,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oLAAoL,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0CAA0C,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mDAAmD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6DAA6D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kTAAkT,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wNAAwN,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uTAAuT,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mOAAmO,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uUAAuU,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAA6R,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0TAA0T,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mSAAmS,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6IAA6I,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6aAA6a,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,+BAA+B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kEAAkE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8UAA8U,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+eAA+e,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAC,yMAAsNE,EAAE,KAAK,CAAC,CAAC,EAAE,sUAAmVA,EAAE,KAAK,CAAC,CAAC,EAAE,8XAA8X,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gdAAgd,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,miBAAmiB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6ZAA6Z,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4MAA4M,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,svBAAsvB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sgBAAsgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,ueAAue,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,shBAAshB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oCAAoC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,mdAAmd,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yYAAyY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kgBAAkgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8dAA8d,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gHAAgH,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+UAA+U,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2QAA2Q,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4UAA4U,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6RAA6R,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2PAA2P,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6DAA6D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ySAAyS,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6RAA6R,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yVAAyV,CAAC,CAAC,CAAC,CAAC,EAAeW,EAAuBb,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,y2BAAo2B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ylBAAylB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0VAA0V,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,wBAAwB,CAAC,EAAE,mbAAmb,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,0bAA0b,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,qcAAqc,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,uSAAuS,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,sVAAsV,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qFAAqF,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mdAAmd,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2OAA2O,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0LAA0L,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oQAAoQ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kIAAkI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+JAA+J,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sMAAsM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2LAA2L,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,qHAAqH,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,eAAe,CAAC,EAAE,2HAA2H,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,iGAAiG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,6IAA6I,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uoBAAuoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAE,4JAA4J,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,mOAAmO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,yMAAyM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,0KAA0K,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oCAAoC,CAAC,EAAE,gPAAgP,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,gOAAgO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yBAAyB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAsJ,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,gBAAgB,CAAC,EAAE,2MAA2M,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,uMAAuM,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,yLAAyL,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAE,yOAAyO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,8PAA8P,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mCAAmC,CAAC,EAAE,yNAAyN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,EAAE,gPAAgP,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wNAAwN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,iNAAiN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAE,kOAAkO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,cAAc,CAAC,EAAE,2QAA2Q,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,EAAE,sOAAsO,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,8PAA8P,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,gNAAgN,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,8BAA8B,CAAC,EAAE,8OAA8O,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yIAAyI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,gQAAgQ,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,+QAA+Q,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,2RAA2R,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,KAAK,CAAC,CAAC,EAAE,yZAAyZ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+SAA+S,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uCAAuC,CAAC,EAAE,sDAAsD,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,8DAA8D,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,uBAAuB,CAAC,EAAE,iEAAiE,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,sBAAsB,CAAC,EAAE,kGAAkG,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,EAAE,yFAAyF,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,EAAE,gHAAgH,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4CAA4C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2lBAA2lB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4NAA4N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qEAAqE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qxBAAqxB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0cAA0c,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gEAAgE,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gPAAgP,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gRAAgR,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sLAAsL,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sPAAsP,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iNAAiN,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yLAAyL,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kLAAkL,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,8BAA8B,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,qjCAAkkCE,EAAE,KAAK,CAAC,CAAC,EAAE,uGAAoHA,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,KAAkBA,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,QAAqBA,EAAE,SAAS,CAAC,SAAS,KAAK,CAAC,EAAE,yeAAye,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kBAAkB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,i6BAAi6B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,48BAA48B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wKAAwK,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8GAA8G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kIAAkI,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+GAA+G,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,2CAA2C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ugBAAugB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ouBAAouB,CAAC,CAAC,CAAC,CAAC,EAAeY,EAAwBd,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4NAAuN,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6RAA6R,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4PAA4P,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gMAAgM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,+BAA0B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gIAAgI,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEE,EAAE,CAAC,KAAK,qEAAqE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBF,EAAEG,EAAE,EAAE,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAE,8JAA8J,CAAC,CAAC,EAAeL,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,KAAK,CAAC,UAAU,gBAAgB,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAAwB,CAAC,EAAE,YAAY,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gXAAgX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAEE,EAAE,CAAC,KAAK,oEAAoE,YAAY,GAAG,OAAO,YAAY,aAAa,GAAG,QAAQ,oBAAoB,aAAa,GAAG,SAAsBF,EAAEG,EAAE,EAAE,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAE,mEAA8D,CAAC,CAAC,EAAeH,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+KAA+K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mCAA8B,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iUAAiU,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,2BAA2B,CAAC,EAAE,oJAAoJ,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,uDAAuD,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0MAA0M,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oBAAoB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kBAAkB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,KAAK,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4IAA4I,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2BAAwCE,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,oFAAoF,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAC,2BAAwCE,EAAE,SAAS,CAAC,SAAS,mBAAc,CAAC,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gBAAgB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wBAAwB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0DAA0D,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,mBAAc,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6KAA6K,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+EAA+E,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,wGAAwG,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAeF,EAAE,IAAI,CAAC,SAAS,CAAcE,EAAE,SAAS,CAAC,SAAS,6BAA6B,CAAC,EAAE,kHAAkH,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,8IAA8I,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2DAA2D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,gCAAgC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8VAAyV,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,OAAO,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,SAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,UAAU,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,cAAS,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qKAAqK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,WAAW,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,kEAA6D,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,4CAA4C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,+CAA+C,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,qCAAqC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,eAAU,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8HAA8H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,kBAAa,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2GAA2G,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,2CAA2C,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,YAAY,CAAC,CAAC,CAAC,EAAeF,EAAE,KAAK,CAAC,SAAS,CAAcE,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeA,EAAE,KAAK,CAAC,kBAAkB,IAAI,SAAsBA,EAAE,IAAI,CAAC,SAAS,QAAQ,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,iBAAiB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8YAA8Y,CAAC,CAAC,CAAC,CAAC,EAAea,EAAwBb,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,8XAAyX,CAAC,CAAC,CAAC,EAAec,EAAwBhB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,2NAA2N,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,MAAM,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,yBAAyB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAsBA,EAAE,SAAS,CAAC,SAAS,qBAAqB,CAAC,CAAC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0BAA0B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,kCAAkC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4SAA4S,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uLAAuL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gDAAgD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oCAAoC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yLAAyL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4BAA4B,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0FAA0F,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6FAA6F,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kNAA6M,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yLAAyL,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yCAAyC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uCAAuC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4DAA4D,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6CAA6C,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,WAAW,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wCAAwC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kDAAkD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sCAAsC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,OAAO,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wEAAwE,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qDAAqD,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,mKAAmK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6EAA6E,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oGAAoG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2HAA2H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kVAAkV,CAAC,CAAC,CAAC,CAAC,EAAee,EAAwBf,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,ygBAAygB,CAAC,CAAC,CAAC,EAAegB,EAAwBlB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,IAAI,CAAC,SAAS,+UAA+U,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,oBAAoB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,qVAAqV,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sXAAsX,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iQAAiQ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yMAAoM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oKAAoK,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2JAA2J,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6LAA6L,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uZAA6Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,uBAAuB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2OAA2O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8tBAA8tB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,aAAa,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oUAAoU,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,iBAAiB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iPAAiP,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kQAAkQ,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2dAA2d,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gBAAgB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,4hBAA4hB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8YAA8Y,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sbAAib,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sQAAiQ,CAAC,CAAC,CAAC,CAAC,EAAeiB,EAAwBjB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,khBAAkhB,CAAC,CAAC,CAAC,EAAekB,EAAwBpB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,iCAAiC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ymBAAymB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,oZAAoZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2IAA2I,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6NAA6N,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wpBAA8oB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mCAAmC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wZAAwZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ilBAAukB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gKAAgK,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,gCAAgC,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,g2BAAs1B,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,mBAAmB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sJAAiJ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,iGAAiG,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,sNAAsN,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2HAA2H,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,yMAAyM,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+IAA+I,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,ucAAuc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wDAAwD,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wZAAmZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8lBAA8lB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,gsBAAirB,CAAC,CAAC,CAAC,CAAC,EAAemB,EAAwBnB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,qXAAqX,CAAC,CAAC,CAAC,EAAeoB,EAAwBtB,EAAIC,EAAS,CAAC,SAAS,CAAcC,EAAE,KAAK,CAAC,SAAS,cAAc,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,wfAAwf,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,8qBAA8qB,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,qBAAqB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,2OAA2O,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,eAAe,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,0OAA0O,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,6hBAA6hB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,kWAAkW,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,sBAAsB,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,uZAAuZ,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,weAAme,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,QAAG,CAAC,EAAeA,EAAE,KAAK,CAAC,SAAS,YAAY,CAAC,EAAeA,EAAE,IAAI,CAAC,SAAS,+mBAAqmB,CAAC,CAAC,CAAC,CAAC,EAAeqB,EAAwBrB,EAAID,EAAS,CAAC,SAAsBC,EAAE,IAAI,CAAC,SAAS,4oBAAuoB,CAAC,CAAC,CAAC,EAC3q0JsB,EAAqB,CAAC,QAAU,CAAC,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,SAAW,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,WAAa,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,UAAY,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["richText", "u", "x", "p", "richText1", "Link", "motion", "richText2", "richText3", "richText4", "richText5", "richText6", "richText7", "richText8", "richText9", "richText10", "richText11", "richText12", "richText13", "richText14", "richText15", "richText16", "richText17", "richText18", "richText19", "__FramerMetadata__"]
}
